A phishing campaign was observed predominantly targeting a notable energy company in the US, employing QR codes to slip malicious...
A vulnerability in Free IPA could lead to XML external entity (XXE) attacks, researchers have warned. FreeIPA is a free and open source identity management system...
A new program is aiming to reward developers and security researchers who make improvements to critical infrastructure based on open source technology. The Secure Open Source...
The Cybersecurity and Infrastructure Security Agency issued a cybersecurity advisory warning about active exploitations of vulnerabilities found in systems using unpatched Zimbra Collaboration Suite. Government agencies...
The memorandum sets up budget expectations for previously established cyber goals. The Office of Management and Budget in July quietly issued a memorandum to all federal civilian agencies...
Android malware developers are already adjusting their tactics to bypass a new ‘Restricted setting’ security feature introduced by Google in the newly released Android 13. Android 13...
Google has released a security update for the Chrome browser that addresses close to a dozen vulnerabilities, including a zero-day flaw that is being exploited in the wild....
Exploit code has been released for a critical vulnerability affecting networking devices with Realtek’s RTL819x system on a chip (SoC), which are estimated to be in...
Security researchers have uncovered multiple vulnerabilities impacting UWB (ultra-wideband) RTLS (real-time locating systems), enabling threat actors to conduct man-in-the-middle attacks and manipulate tag geo-location data. RTLS...
The tamper protection feature in Microsoft Defender for Endpoint for macOS is getting rolled out to all customers, the company has announced on Monday. The feature...
If your business has moved toward off-premises computing, there’s a bonus to the flexibility and scalability services that AWS and Microsoft 365 can provide. Incident response (IR) in...
Recent Comments