The enterprise-targeting Bumblebee malware is distributed through Google Ads and SEO poisoning that promote popular software like Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace. Bumblebee is...
Researchers are seeing a rise in attacks spreading the EvilExtractor data theft tool, used to steal users’ sensitive data in Europe and the U.S. EvilExtractor is...
LockBit ransomware gang targets Macs with its newly-developed encryptors for the first time, making them potentially the first significant ransomware group to aim at macOS. Ransomware...
Google Cloud is making it’s Assured Open Source Software (Assured OSS) service available for Java and Python ecosystems without charge in response to the rising dangers...
The benefit exchange’s director testified before a House Committee on the ongoing investigation into a data breach exposing DC residents’ and lawmakers’ data. Leadership from the...
The Logging Made Easy tool will move to CISA’s GitHub page later this year but will be unsupported in the meantime. The United Kingdom’s cybersecurity agency...
The management of the government’s IT acquisitions and operations is also on the Government Accountability Office’s biennial high risk list update this year, as it has...
Morphisec Threat Labs researchers have recently exposed a sneaky loader called “in2al5d p3in4er” (Invalid Printer) that delivers Aurora information stealer malware through YouTube videos. Using an...
DNS security is critical in today’s world to protect against the growing threat of DNS attacks. The risk of financial loss, data theft, and reputational damage...
Recently, Google released an emergency security update to fix another Chrome zero-day vulnerability actively exploited in the wild. This zero-day flaw has been tracked as CVE-2023-2136...
Recent Comments