The Cybersecurity and Infrastructure Security Agency (CISA) has added a vulnerability for the Joomla! Content Management System (CMS) to its…
The data leak occurred due to a misconfigured database at Raptor Technologies, a Texas-based school safety software provider. A data…
Most new model cars are not just cars anymore. With multiple digital systems, vehicles are increasingly plugged into web applications…
Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates to address two critical vulnerabilities, including one that could…
Mandiant, a threat intelligence company affiliated with Google Cloud, recently made headlines as it fell victim to a hacking group…
The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data…
Hackers have been exploiting the two zero-day vulnerabilities in Ivanti Connect Secure disclosed this week since early December to deploy multiple…
Hackers target vulnerable WordPress plugins as they provide a potential entry point to exploit website security weaknesses. These plugins often…
“The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end…
Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different malware families were deployed by suspected nation-state actors as…
Researchers created a PoC for Apache OFBiz flaw CVE-2023-51467 Pierluigi Paganini January 12, 2024 Researchers published a proof-of-concept (PoC) code for the…
Several vulnerabilities have been discovered in Splunk Enterprise Security and Splunk User Behavior Analytics (UBA), which existed in several third-party…











