The two measures, which passed the committee with bipartisan support, would give CISA authority across DHS and the federal government....
Fully-functional exploit code is now publicly available for a maximum severity pre-auth vulnerability impacting default configurations of an SAP Solution Manager (SolMan) component. SAP SolMan is an...
A Magento website owner was concerned about malware and reached out to our team for assistance. Upon investigation, we found the website contained a PHP injection...
Gamarue malware is also known as Andromeda or Wauchos having linked to Russian servers. A few years ago, Police in Taiwan distributed malware-infected USBs as cybersecurity quiz prizes....
Drupal has released a security update to address a critical vulnerability in a third-party library with documented or deployed exploits available in the wild. “The Drupal...
Netscout researchers identify more than 14,000 existing servers that can be abused by ‘the general attack population’ to flood organizations’ networks with traffic. Cybercriminals can exploit...
North Korea is laser-focused on boosting its cyber capabilities, and it’s doing a remarkable job of it. Although the US and the United Nations have levied...
Ransomware gang publishes stolen data after Scottish Environment Protection Agency (SEPA) refuses to pay ransom – as agency confirms operations remain disrupted. The hackers behind the ransomware attack...
Zscaler’s ThreatLabz research team is tracking a new botnet dubbed DreamBus that’s installing the XMRig cryptominer on powerful enterprise-class Linux and Unix systems with the goal of...
Director of National Intelligence Avril Haines yesterday took the oath of office to serve as the seventh DNI in the U.S.’s history. Haines is the first...
A Russian national has pleaded guilty before a US federal court to being the administrator of a website that helped cybercrooks build illicit webstores. Kirill Victorovich...
Recent Comments