North Korean State-Sponsored Hackers Suspected in JumpCloud Supply Chain Attack
Jul 20, 2023THNCyber Attack / Supply Chain An analysis of the indicators of compromise (IoCs) associated with the JumpCloud hack has uncovered evidence pointing to…
Jul 20, 2023THNCyber Attack / Supply Chain An analysis of the indicators of compromise (IoCs) associated with the JumpCloud hack has uncovered evidence pointing to…
Jul 20, 2023THNVulnerability / Software Security Multiple security flaws have been disclosed in Apache OpenMeetings, a web conferencing solution, that could be potentially exploited by…
Beaten, blinded by pepper spray, corralled like animals, and indiscriminately arrested for marching against police violence and racial injustice. Such was the fate hundreds of…
Jul 20, 2023THNHardware Security / SysAdmin Two more security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software that, if successfully exploited,…
Wallarm is excited to be back at Black Hat USA this year and meet with our friends in the community wanting (or perhaps needing) to…
Adobe released an emergency ColdFusion security update that fixes critical vulnerabilities, including a fix for a new zero-day exploited in attacks. As part of today’s…
Jul 20, 2023THNEndpoint Security / Data Safety Mallox ransomware activities in 2023 have witnessed a 174% increase when compared to the previous year, new findings…
A Rust-based file-encrypting ransomware was found this week to be impersonating the cybersecurity firm Sophos as part of its operation. Dubbed ‘SophosEncrypt’, the malware is…
Web applications remain a prime target for cyberattacks, posing significant risks to businesses and their bottom lines. So much so, in fact, that a staggering…
Firmware and hardware security company Eclypsium has disclosed information on two new vulnerabilities found by its researchers in the American Megatrends (AMI) MegaRAC Baseboard Management…
The American cosmetics giant company Estée Lauder was hacked by two distinct ransomware groups, the ALPHV/BlackCat and Clop gangs. Yesterday the cybersecurity expert @sonoclaudio first…
Image: Bing Image Creator Two new critical severity vulnerabilities have been discovered in the MegaRAC Baseboard Management Controller (BMC) software made by hardware and software…