Researchers Uncover GitHub Vulnerability Endangering Users
A GitHub vulnerability has recently caught the attention of researchers. The vulnerability threatens multiple GitHub repositories, even affecting the users who are part of it.…
A GitHub vulnerability has recently caught the attention of researchers. The vulnerability threatens multiple GitHub repositories, even affecting the users who are part of it.…
Ransomware attacks in the UK have risen to frightening proportions, affecting more than 700 companies and posing a risk to more than 5.3 million people.…
Airbus has launched an investigation after a hacker leaked information allegedly stolen from the French aerospace giant’s systems. Cybercrime intelligence firm Hudson Rock reported on…
Redfly group infiltrated an Asian national grid as long as six months Pierluigi Paganini September 13, 2023 A threat actor tracked as Redfly had infected the systems…
A new ransomware strain called 3AM has been uncovered after a threat actor used it in an attack that failed to deploy LockBit ransomware on…
Cisco has updated its full-stack observability platform with the latest version of Cisco Secure Application, designed to help IT departments secure development and deployment of…
Bug Bytes is a weekly newsletter curated by members of the bug bounty community. The second series is curated by InsiderPhD. Every week, she keeps…
Virtual conference will explore cybersecurity use-cases for artificial intelligence (AI) technology and the race to protect LLM algorithms from adversarial use. SecurityWeek will host its…
CVE Number CVE Title Impact Max Severity Tag CVE-2023-4863 Chromium: CVE-2023-4863 Heap buffer overflow in WebP Microsoft Edge (Chromium-based) CVE-2023-41764 Microsoft Office Spoofing Vulnerability Spoofing…
In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1 2023. In the case of…
Enterprise macOS users are being targeted by attackers slinging new information-stealing malware dubbed MetaStealer. The MetaStealer malware MetaStealer is delivered within malicious disk image format…
There is a new battlefield. It is global and challenging to defend. What began with a high-profile incident back in 2007, when Estonia was hit…