On August 30, 2023, a malicious actor gained unauthorized access to specific Sourcegraph(.)com data through a leaked admin access token....
The Office of the National Cyber Director, the National Space Council and leaders from the private sector laid out next steps to digitally secure the space...
Twitter has taken down internal source code for its platform and tools that was leaked on GitHub for months. Now it’s using a subpoena to search for...
Pwn2Own Vancouver 2023 has ended with contestants earning $1,035,000 and a Tesla Model 3 car for 27 zero-day (and several bug collisions) exploited between March 22...
A new info-stealing malware named MacStealer is targeting Mac users, stealing their credentials stored in the iCloud KeyChain and web browsers, cryptocurrency wallets, and potentially sensitive files....
New IcedID variants have been found without the usual online banking fraud functionality and instead focus on installing further malware on compromised systems. According to Proofpoint, these...
Apple has released security updates to backport patches released last month, addressing an actively exploited zero-day bug for older iPhones and iPads. The vulnerability (CVE-2023-23529) is...
Microsoft is introducing a new Exchange Online security feature that will automatically start throttling and eventually block all emails sent from “persistently vulnerable Exchange servers” 90 days after...
Australian loan giant Latitude Financial Services (Latitude) is warning customers that its data breach is much more significant than initially stated, taking the number of affected...
Businesses rely on their end-users, but those same users often don’t follow the best security practices. Without the right password security policies, a single end-user password...
A new North Korean hacking group has been revealed to be targeting government organizations, academics, and think tanks in the United States, Europe, Japan, and South...
Recent Comments