Microsoft has warned the security community that the Log4j vulnerabilities still represent a complex and high risk for companies across the globe, as this open-source component...
On December 9, 2021, a (now deleted) tweet linking to a 0-day proof of concept (PoC) exploit (also now deleted) for the Log4Shell vulnerability on GitHub...
A wave of phishing attacks identified in December targeting mainly Outlook users are difficult for both email scanners and victims to flag, researchers said. Attackers are...
County government buildings and public offices were closed on Wednesday across the cities of Albuquerque, Los Ranchos, and Tijeras after a ransomware attack crippled the IT...
Threat actors associated with the North Korean regime are reportedly targeting cryptocurrency exchanges. So far, the attackers have stolen $1.7 billion worth of cryptocurrency from the...
In a hurry to park your car? Don’t want to fumble around in your pocket to find cash for the parking meter, and don’t have the...
Web skimming attacks are targeting hundreds of real estate websites via a cloud-based video hosting service, researchers have warned. A blog post from Unit 42, the research arm...
A financially-motivated actor dubbed ‘Elephant Beetle’ is stealing millions of dollars from organizations worldwide using an arsenal of over 80 unique tools and scripts. The group...
Application Programming Interfaces (APIs) underpin today’s digital ecosystem as the essential connective tissue that allows companies to exchange data and information quickly and securely. As the...
The US Federal Trade Commission (FTC) has warned today that it will go after any US company that fails to protect its customers’ data against ongoing...