A sophisticated nation-state adversary with advanced capabilities attacked Jumpcloud with a spear phishing attack. JumpCloud is a US-based zero-trust directory platform that customers use to authenticate,...
CISA urged government agencies to apply the patch immediately for Microsoft Office and Windows HTML remote code execution vulnerabilities exploited in the wild. As a result,...
It has been reported that any individual could potentially deactivate a WhatsApp account by sending an email, and currently, there is no known method to prevent...
HCL BigFix is an endpoint management platform that has the capability to automate discovery, management, and remediation. It can find and fix vulnerabilities on endpoints whether...
In an era where cyber threats continue to evolve, healthcare organizations are increasingly targeted by malicious actors employing multiple attack vectors, according to Trustwave. In its new research,...
Consumer expectations will reshape the needs and economics of the internet, according to Cisco. People in EMEA are rethinking what they rely on the internet for,...
Red Siege has developed and made available many open-source tools to help with your penetration testing work. The company plans to continue to support the tools...
VirusTotal has suffered a data leak that exposed the names and email addresses of 5,600 of its registered users. The leaked data reportedly includes information about...
A financially motivated cybercrime gang has been observed deploying BlackCat ransomware payloads on networks backdoored using a revamped Sardonic malware version. Tracked as FIN8 (aka Syssphinx), this threat...
A critical design flaw in the Google Cloud Build service discovered by cloud security firm Orca Security can let attackers escalate privileges, providing them with almost...