The purple fox malware has been active since 2018, adopting a new technique to deliver its payload through MS SQL servers. The threat actors target poorly managed MS...
Malware authors persistently seek novel approaches to exploit unsuspecting users in the active cyber threat landscape. To easily locate all the available files, folders, and other items on...
Google has announced an alerting and manual scanning mechanism which can be used to find unknown tracker alerts. This feature will be rolled out to Android 6.0+...
A Critical Remote Code Execution (RCE) vulnerability has been discovered in Metabase which could allow hackers to infiltrate servers and execute unauthorized commands. The developers of...
Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals’ ‘Users Data’ protected health information. Maximus, a US government contracting business based...
Cyberspace Ambassador Nathaniel Fick argued that the U.S. needs to be able to provide cybersecurity assistance to allies in a way that incorporates emerging technologies. The...
Blockchain analysts blame the North Korean Lazarus hacking group for a recent attack on payment processing platform Alphapo where the attackers stole almost $60 million in...
Microsoft announced a new Defender for IoT feature that will allow analyzing the firmware of embedded Linux devices like routers for security vulnerabilities and common weaknesses....
The rule that details the defense industrial base’s new cybersecurity standard appears ready for review at the Office of Management and Budget. The Defense Department and...
After noting the increasing number of cyberattacks on U.S. networks, the SEC is asking company leadership for quick cyber incident disclosures and more documentation. The Securities...