The role of CISO these days requires a strong moral compass: You have to be the one speaking up for the protection of customer data and...
A privilege escalation vulnerability (CVE-2023-30799) could allow attackers to commandeer up to 900,000 MikroTik routers, says VulnCheck researcher Jacob Baines. While exploting it does require authentication,...
A critical severity ‘Super Admin’ privilege elevation flaw puts over 900,000 MikroTik RouterOS routers at risk, potentially enabling attackers to take full control over a device...
The ALPHV ransomware gang, also referred to as BlackCat, is trying to put more pressure on their victims to pay a ransom by providing an API...
As per reports, threat actors have been using domestic VPN installation files for distributing SparkRAT malware which leads to MeshAgent infection on the victim systems. The difference between...
Thales has acquired a prominent cybersecurity company situated in the United States, renowned for its proficiency in data and application security, for a whopping $3.6 billion....
Cloud cryptojacking disguises itself as cloud computing resource abuse, where threat actors exploit legitimate tenants for cryptocurrency mining using their computing power. Cloud computing abuse leads to...
The ecommerce industry is on the rise. According to Statista, global e-commerce sales amounted to approximately $5.2 trillion. Moreover, experts predict this figure to reach about...
VA Chief Information Officer Kurt DelBene told Nextgov/FCW that the department “faces a unique challenge” in adopting zero trust because of the need to secure veterans’...
White House officials named former National Security Agency official Harry Coker, Jr. as the nominee to replace former National Cyber Director Chris Inglis amid the ongoing...