Security teams are stretched, with not enough people, skills or budget to cope with all their priorities, according to Panaseer….
The FTC is going head to head with a DNA testing startup which left consumer data unsecured on Amazon buckets….
We take a look at one group’s creative tactics to ensure a payout from a compromised university. The University of…
An open-source version of the Java Servlet, JavaServer Pages, Java Expression Language, and Java WebSocket technologies is known as Apache…
Condi is the second DDoS botnet to exploit CVE-2023-1389, with the Mirai botnet targeting it in April 2023. FortiGuard Labs…
Proof-of-concept exploit code is now available for a high-severity flaw in Cisco Secure Client Software for Windows (formerly AnyConnect Secure…
Car mount and mobile accessory maker iOttie warns that its site was compromised for almost two months to steal online…
The North Korean APT37 hacking group uses a new ‘FadeStealer’ information-stealing malware containing a ‘wiretapping’ feature, allowing the threat actor…
By Aaron Haynes, a Columnist at Loganix.com Cybersecurity is a top priority for many businesses today because of the significant…
Apple has rolled out a major security-themed iOS update to fix remote code execution vulnerabilities that have already been exploited…
Russia-linked APT28 group hacked into Roundcube email servers belonging to multiple Ukrainian organizations. A joint investigation conducted by Ukraine’s Computer…
The Swing VPN app, which is available on the official Google Play Store under the name Swing VPN – Fast…










