Topgolf Callaway (Callaway) suffered a data breach at the start of August, which exposed the sensitive personal and account data...
Threat hunting Tools are essential for undetected cybersecurity threats hiding in the network, databases, and endpoints. The approach requires researching deeply into the environment to locate...
Threat actors frequently employ malicious Google Ads and SEO poisoning to spread malware. Recently, Secureworks’ Counter Threat Unit (CTU) researchers reported that Cyber attackers are actively using Google...
The Government Accountability Office noted that several major acquisition programs at DHS didn’t think the requirement applied to them. The Department of Homeland Security needs to...
The X_Trader software supply chain attack that led to last month’s 3CX breach has also impacted at least several critical infrastructure organizations in the United States...
A lot of news broke this week related to ransomware, with the discovery of LockBit testing macOS encryptors to an outage on NCR, causing massive headaches...
The enterprise-targeting Bumblebee malware is distributed through Google Ads and SEO poisoning that promote popular software like Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace. Bumblebee is...
Researchers are seeing a rise in attacks spreading the EvilExtractor data theft tool, used to steal users’ sensitive data in Europe and the U.S. EvilExtractor is...
LockBit ransomware gang targets Macs with its newly-developed encryptors for the first time, making them potentially the first significant ransomware group to aim at macOS. Ransomware...
DNS security is critical in today’s world to protect against the growing threat of DNS attacks. The risk of financial loss, data theft, and reputational damage...
Recently, Google released an emergency security update to fix another Chrome zero-day vulnerability actively exploited in the wild. This zero-day flaw has been tracked as CVE-2023-2136...
Recent Comments