As part of its ongoing efforts to protect Microsoft cloud environments against malicious activity, CISA recently introduced an open-source incident…
[ This article was originally published here ] By John Weiler FBI arrests Breached hacking forum leader, smartphones hijacked without…
A cyberespionage hacking group tracked as ‘Bitter APT’ was recently seen targeting the Chinese nuclear energy industry using phishing emails…
Software security company Synopsys have discovered a new remote code execution vulnerability (RCE) in the Pluck CMS system. Pluck is…
Thousands of Facebook accounts have been stolen due to a trojanized version of the legitimate ChatGPT extension for Google Chrome….
Mar 24, 2023Ravie LakshmananDevSecOps / Software Security A malicious Python package on the Python Package Index (PyPI) repository has been…
After a host of targets including the City of Toronto, Hitachi Energy, and P&G, the government of the Indian state…
announcement-date: 2020-11-17 id: KCSA-CVE-2020-28914 title: Kata Containers Improper file permissions for read-only volumes description: An improper file permissions vulnerability affects…
The USB drive was found to contain RDX, a military-grade explosive substance that was inside a capsule attached to the…
Intel has launched the latest Intel vPro platform, which is powered by 13th Gen Intel Core processors and offers a…
Mar 24, 2023Ravie LakshmananCloud Security / Programming Cloud-based repository hosting service GitHub said it took the step of replacing its…
The National Crime Agency has infiltrated a cyber crime marketplace by setting up websites pretending to offer the tools needed…










