Unless the venerable language has finally breathed its last – which is more than a little unlikely – the Perl.com domain was hijacked yesterday. A warning...
Libgcrypt 1.9.0, the newest version of a cryptographic library integrated in the GNU Privacy Guard (GnuPG) free encryption software, has a “severe” security vulnerability and should not be...
iOS 14 shipped with BlastDoor, a new sandbox system for processing iMessages data. With the release of iOS 14 last fall, Apple has added a new...
Multiple vulnerabilities patched recently in the popular WordPress plugin Popup Builder could be exploited to perform various malicious actions on affected websites. With over 200,000 installations...
Tanium may not be a household name, at least not yet. But the fast-growing cybersecurity company, which moved its headquarters from the San Francisco Bay Area...
A prominent vehicle-for-hire and parcel delivery company based in Pakistan has suffered a significant data breach which affected its extensive user database. The Safety Detectives cybersecurity team, led...
Clearsky researchers linked the Lebanese Cedar APT group to a cyber espionage campaign that targeted companies around the world. Clearsky researchers linked the Lebanese Cedar group...
Cybersecurity startup CybSafe, a “behavioral security” platform, has raised $7.9 million in a Series A funding round led by IQ Capital with participation from Hanover Digital Investments (HDI) GmbH and B8...
Since the past takedown attempt in November 2020, TrickBot malware has not only re-emerged, its operators have been launching newer versions from time to time. They...
A North Korean government-backed hacking group has been leveraging researchers’ curiosity for vulnerability research and exploit development, according to a recent Google Threat Analysis Group report. Fake persona...