The Chaes malware has returned as a new, more advanced variant that includes a custom implementation of the Google DevTools...
Researchers at Varonis Threat Labs discovered that some Salesforce sites were improperly deactivated or unmaintained SalesforceGhost Sites. Threat actors can exfiltrate PII and business data by simply...
A recently discovered vulnerability called “Migraine” is linked to macOS migration and poses a serious threat. It enables attackers with root privileges to circumvent System Integrity Protection...
Kaspersky recently reported that a number of iPhones connected to its network were compromised through an iOS vulnerability. The attackers exploited iMessage’s zero-click exploits, allowing them to install...
MOVEit Transfer software was discovered to be vulnerable to a potential privilege escalation and unauthorized access to the environment. Users are recommended to take the actions...
Google Drive is one of the most used cloud-based storage platforms, and due to its immense popularity and capabilities, it’s actively targeted by threat actors. Data...
Organizations dealing with card payment data must comply with the Payment Card Industry Data Security Standard (PCI DSS) to protect cardholder data. Per this Standard, PCI Penetration...
SIEM is now a fundamental security component of modern enterprises. The major reason is that each customer or tracker creates a virtual footprint in the log...
As technology advances, more and more organizations are turning to cloud computing as a necessary solution for their data storage and processing needs. Cloud computing is...
Google has removed 32 malicious extensions from the Chrome Web Store that could have changed search results and pushed spam or unwanted adverts. They have received 75 million...
The Cyber Incident Reporting Council will issue a report to Congress “in the next month or two” with recommendations on ways to achieve harmony across a...
Recent Comments