Millions of WordPress ecommerce websites affected by these two vulnerabilities
Over one million different attempts have been made to get into a popular WordPress plugin over the last several days,...
Read more →Over one million different attempts have been made to get into a popular WordPress plugin over the last several days,...
Read more →As digital transformation continues to reshape the business landscape, it surfaces a new set of cybersecurity challenges. In a recent...
Read more →The online malware scanning service VirusTotal leaked data associated with some registered customers, German newspapers reported. German newspapers Der Spiegel and Der...
Read more →is pioneering innovation in the API security space, and Subbu Iyer, the company’s VP of Product Management, provided a comprehensive...
Read more →The U.S. government’s clampdown on commercial spyware and mercenary hacking companies ramped up this week with the addition of Cytrox...
Read more →Citrix today is alerting customers of a critical-severity vulnerability (CVE-2023-3519) in NetScaler ADC and NetScaler Gateway that already has exploits...
Read more →Cybersecurity vendor Sophos is being impersonated by a new ransomware-as-a-service called SophosEncrypt, with the threat actors using the company name...
Read more →Recently, Ohio Secretary of State Chief Information Security Officer Jillian Burner, and HackerOne Co-founder and Head of Professional Services, Michiel...
Read more →The cybercrime group FIN8 is using a revamped version of the Sardonic backdoor to deliver the BlackCat ransomware. The financially motivated group...
Read more →Creating Continuous Attack Resistance In order to stay ahead of cybercriminals, businesses need to preemptively find flaws in their digital...
Read more →The global cyber insurance market is expected to reach over $20 billion by 2025. However, many organizations are finding it...
Read more →Citrix today is alerting customers of a critical-severity vulnerability (CVE-2023-3519) in NetScaler ADC and NetScaler Gateway that already has exploits...
Read more →