A new kernel module rootkit malware was released recently on GitHub, dubbed Reptile. It’s an open-source rootkit that has the ability to hide itself, other malicious codes, files, directories,...
The Russian ransomware group ‘Clop’ exploits a flaw in Progress Software’s MOVEit product suite in late May to steal data from unprotected networks. According to German cybersecurity research firm...
The Flipper Zero team has announced the official launch of “Flipper Apps,” a new app store enabling mobile users to download third-party apps and expand the capabilities...
Ivanti ‘s mobile device management software EPMM(Endpoint manager mobile), aka Mobile iron core version lower than 11.8.1.0, was impacted by the actively exploited zero-day vulnerability. On Sunday, the...
Global radios rely on the TETRA (Terrestrial Trunked Radio) standard, but various vulnerabilities and multiple flaws have been uncovered, impacting its usage in Europe, the UK, and other nations, affecting...
Apple has issued security patches to address zero-day vulnerabilities that have been exploited in attacks against iPhones, Macs, and iPads that seriously affect the digital security of Apple...
On July 18th, Atlassian discovered critical and high vulnerabilities through bug bounty programs, third-party library scans, and penetration testing. In their security bulletin, they have addressed...
CISA’s Continuous Diagnostics and Mitigation program uses close collaboration with federal agencies to identify and respond to cyber threats, including last month’s MOVEit breach. The Cybersecurity...
This isn’t the first DHS agency to come under fire for its access control deficiencies. U.S. Immigration and Customs Enforcement isn’t consistently implementing controls to prevent...
A new report noted that a lack of “established policies and procedures” could prevent the tax agency from meeting federal requirements. An Internal Revenue Service watchdog...