Despite recent improvements, a watchdog report claims the agency still has more it can do to make threat-sharing policies more effective. Though the Federal Deposit Insurance...
Apple announced today that iOS security researchers can now apply for a Security Research Device (SRD) by the end of October. SRDs are iPhone 14 Pros with disabled...
Researchers took advantage of a weakness in the encryption scheme of Key Group ransomware and developed a decryption tool that lets some victims to recover their...
Threat actors targeting unpatched Citrix NetScaler systems exposed to the internet are being tracked by Sophos X-Ops. As per research, the recent attacks share a similarity...
According to recent reports, a number of vulnerabilities have been discovered in widely used ZIP libraries of Swift and Flutter. These packages are being utilized by...
Splunk has been reported with a Unauthenticated Log injection vulnerability in the Splunk IT Service Intelligence (ITSI) product. This vulnerability exists in Splunk ITSI versions prior to 4.13.3...
With the growing trend of businesses transitioning their operations to cloud-based Software as a Service (SaaS) platforms, ensuring the security of these systems has become of...
As per reports, VMware has been reported with two critical vulnerabilities that could allow threat actors to perform an authentication bypass and gain arbitrary write access...
The FBI and the Justice Department have declared a global effort to disrupt and dismantle the Qakbot infrastructure, which is utilized in ransomware attacks. More than 700,000...
The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia’s Italian-American clans. This new group of “Five Families” involves...