Recently, cybersecurity researchers at Deep Instinct have asserted that hackers can exploit the Windows container isolation framework to bypass the...
TMX Finance and its subsidiaries TitleMax, TitleBucks, and InstaLoan have collectively disclosed a data breach that exposed the personal data of 4,822,580 customers. TMX is a...
A 10-year-old Windows vulnerability is still being exploited in attacks to make it appear that executables are legitimately signed, with the fix from Microsoft still “opt-in”...
Hackers are actively exploiting a high-severity vulnerability in the popular Elementor Pro WordPress plugin used by over eleven million websites. Elementor Pro is a WordPress page...
ExaTrack found a new undetected implant family called Mélofée that targets Linux systems. Three samples of the previously known malicious software, dating from the beginning of...
Azure Active Directory (AAD) has a new attack vector that affected Microsoft’s Bing.com, according to Wiz Research. A widespread AAD misconfiguration is the attack vector, making...
In 2023, it has never been more critical for CISOs to secure API ecosystems. There are many advantages to APIs. The main benefit is the interconnectivity...
Uptycs threat research team recently discovered “MacStealer,” a new information-stealing malware designed to target Apple’s macOS operating system. It aims to steal various sensitive information, including...
Europol Innovation Lab recently conducted workshops with experts from Europol to investigate the potential for criminal abuse of language models like ChatGPT and their usefulness for...
Recently Microsoft launched Security Copilot which marks Microsoft’s continued attempt to embed AI-oriented features at a rapid pace and large scale to offer an end-to-end defense...
Cyber incident reports will be shared with the agency under the soon-to-be implemented requirements of the Cyber Incident Reporting for Critical Infrastructure Act. Cyber incident reporting...
Recent Comments