CyberArk, a leading identity security provider announced its definitive agreement to acquire Venafi, a leading machine identity management provider from…
Security
Ukraine’s leading mobile operator, Kyivstar, is facing the aftermath of last year’s cyberattack. In December 2023, the telecom provider faced,…
The persistent threat actors behind the SolarMarker information-stealing malware have established a multi-tiered infrastructure to complicate law enforcement takedown efforts, new findings…
The U.S. Environmental Protection Agency (EPA) issued a stern warning on May 20th, 2024, highlighting the escalating cyber threats to…
A new attack campaign dubbed CLOUD#REVERSER has been observed leveraging legitimate cloud storage services like Google Drive and Dropbox to stage malicious…
GitHub has rolled out fixes to address a maximum severity flaw in the GitHub Enterprise Server (GHES) that could allow…
UK data watchdog has warned against ignoring the data protection risks in generative artificial intelligence and recommended ironing out these…
After years of hypergrowth, Palo Alto Networks’ (PANW) revenue growth has been slowing, suggesting major shifts in cybersecurity spending patterns…
Kansas City faced significant disruptions following a cyberattack, particularly affecting its crucial KC Scout camera system, which monitors Metro highways.…
Cybersecurity researchers have discovered a critical security flaw in a popular logging and metrics utility called Fluent Bit that could…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added a security flaw impacting NextGen Healthcare Mirth Connect to its Known Exploited…
Secretforums, a data leaks forum, announced that it would bestow former BreachForums members with ranks similar to what they had…
The U.S. law enforcement has arrested an alleged operator of “Incognito Market,” a major online dark web narcotics marketplace that…
 Microsoft on Monday confirmed its plans to deprecate NT LAN Manager (NTLM) in Windows 11 in the second half of…
The Medusa ransomware group has allegedly claimed a cyberattack on Comwave, a Canadian communications giant. The ransomware actors listed Comwave…
File Integrity Monitoring (FIM) is an IT security control that monitors and detects file changes in computer systems. It helps…
One of the enduring challenges of building modern applications is to make them more secure without disrupting high-velocity DevOps processes…
A critical security flaw has been disclosed in the llama_cpp_python Python package that could be exploited by threat actors to achieve arbitrary…
A critical security vulnerability(CVE-2024-4323) referred to as “Linguistic Lumberjack,” has been found within Fluent Bit, a widely-used logging and metrics…
Western Sydney University (WSU) finds itself grappling with a cybersecurity challenge as a recent data breach affects approximately 7,500 individuals…