A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can...
A vulnerability in Xalan-J, an Apache project used by multiple SAML implementations, could allow arbitrary code execution, researchers warn. XSLT (Extensible Stylesheet Language Transformations) is a...
An open source project designed to help security researchers fingerprint WordPress Plugins is seeking feedback and contributors. Currently in beta mode, WPHash is a free-to-use web service that...
Apple has released security updates to address the eighth zero-day vulnerability used in attacks against iPhones and Macs since the start of the year. In security advisories issued...
The Lorenz ransomware gang now uses a critical vulnerability in Mitel MiVoice VOIP appliances to breach enterprises, using their phone systems for initial access to their...
A set of six high-severity firmware vulnerabilities impacting a broad range of HP devices used in enterprise environments are still waiting to be patched, although some of...
A growing number of ransomware groups are adopting a new tactic that helps them encrypt their victims’ systems faster while reducing the chances of being detected and...
The new rules elaborate on what kinds of cyber activities warrant sanctions designation. The Treasury Department blocked U.S. persons and entities from engaging in property transactions with...
Federal officials remain on guard against foreign meddling in U.S. elections, as CISA and other agencies work to strengthen partnerships and intelligence sharing efforts with state...
The Vice Society gang has claimed the ransomware attack that hit Los Angeles Unified (LAUSD), the second largest school district in the United States, over the weekend....
The Lampion malware is being distributed in greater volumes lately, with threat actors abusing WeTransfer as part of their phishing campaigns. WeTransfer is a legitimate file-sharing...
Recent Comments