In a volatile year that saw many organizations furloughing workers or closing down their operations entirely, cautious signs of optimism are gradually beginning to appear as...
Zoom has joined the CVE Program as a CVE Numbering Authority (CNA). “This is a significant milestone for us as our security program continues to mature here...
Today, Apple has released security updates that fix two actively exploited iOS zero-day vulnerabilities in the Webkit engine used by hackers to attack iPhones, iPads, iPods,...
Cloud service providers hoping to secure authorizations to operate at multiple agencies simultaneously got some more time to make a business case for their prioritization by...
A multi-billion pound British class action lawsuit has been filed against the tech giant Google in the UK Supreme Court. The lawsuit alleges that Google secretly...
Like other antivirus programs, Microsoft Defender will upload suspicious files to Microsoft to determine if they are malicious. However, some consider this a privacy risk and...
Dridex is active again; it has returned with phishing attacks masquerading as QuickBooks invoices. This ongoing phishing campaign started on April 19, and it targets users...
Zero-day vulnerabilities are among the deadliest threats leveraged by attackers to accomplish their malicious attacks. Everyone is aware of the damage caused by the recent ProxyLogon zero-day attacks....
The North Korea-based threat actor Lazarus had targeted e-commerce shops in 2019 and 2020 to steal payment card information. In those attacks, the attackers were experimenting...
The eSentire Threat Response Unit (TRU) has identified that attackers are using new techniques to lure business professionals to hacker-controlled websites hosted on Google Sites. Moreover,...