Lax policies for package naming on Microsoft’s PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular...
Senate Homeland Security Committee members grilled social media executives about their content moderation practices and ties to foreign adversaries. Lawmakers expressed national security concerns about the...
A new distributed denial-of-service (DDoS) attack that took place on Monday, September 12, has broken the previous record that Akamai recorded recently in July. DDoS attacks...
Agencies are also allowed to accept to-do lists from vendors who need to keep working up to a point where they can self-attest their compliance with...
The former public official—and legendary hacker’s—decision to expose what he described as a disastrous security environment at the company has prompted an unlikely alliance in Congress....
An Iranian-aligned hacking group uses a new, elaborate phishing technique where they use multiple personas and email accounts to lure targets into thinking its a realistic...
The Wordfence Threat Intelligence team warned today that WordPress sites are actively targeted with exploits targeting a zero-day vulnerability in the WPGateway premium plugin. WPGateway is a...
The Dutch police arrested a 39-year-old man on suspicions of laundering tens of millions of euros worth of cryptocurrency stolen in phishing attacks. ‘Politie Gelderland’ (Eastern)...
Security software firm Trend Micro warned customers today to patch an actively exploited Apex One security vulnerability as soon as possible. Apex One is an endpoint security...
Security researchers have developed an implementation of the Sysinternals PsExec utility that allows moving laterally in a network using a single, less monitored port, Windows TCP...
Security researchers have identified new cyber-espionage activity focusing on government entities in Asia, as well as state-owned aerospace and defense firms, telecom companies, and IT organizations....
Recent Comments