Google’s seven-year-long bug bounty program for popular Android apps on the Google Play Store is set to conclude on August…
Security
As cloud infrastructure becomes the backbone of modern enterprises, ensuring the security of these environments is paramount. With AWS (Amazon…
BlindEagle, also known as “APT-C-36,” is an advanced persistent threat (APT) group recognized for its straightforward yet impactful attack techniques…
A recent malicious campaign by the Iranian threat actor TA453 has come to attention after the group had targeted a…
The NUMOZYLOD malware family, also known as FakeBat, EugenLoader, and PaykLoader, has been linked to a surge in malware infections…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw impacting Jenkins to its Known Exploited…
Cybersecurity researchers are warning about the discovery of thousands of externally-facing Oracle NetSuite e-commerce sites that have been found susceptible…
Cybersecurity researchers have shed light on a threat actor known as Blind Eagle that has persistently targeted entities and individuals…
Cryptocurrency firm Unicoin has disclosed a cyberattack that temporarily locked its employees out of critical Google services. The Unicoin cyberattack,…
The GiveWP plugin, a widely used donation and fundraising tool for WordPress, has recently undergone a crucial update to address…
As digital content and intellectual property become increasingly valuable assets for businesses, the need to protect them from unauthorized use…
Iranian state-sponsored threat actors have been observed orchestrating spear-phishing campaigns targeting a prominent Jewish figure starting in late July 2024…
A critical vulnerability has been discovered in several popular Microsoft apps in Apple MacBook. The vulnerability could potentially allow hackers…
Cybersecurity researchers have disclosed a security flaw impacting Microsoft Azure Kubernetes Services that, if successfully exploited, could allow an attacker…
Singapore has recently launched the updated Operational Technology Cybersecurity Masterplan, known as the OT Masterplan 2024, during the fourth edition…
In today’s rapidly evolving cyber threat landscape, organizations face increasingly sophisticated attacks targeting their applications. Understanding these threats and the…
A previously undocumented backdoor named Msupedge has been put to use against a cyber attack targeting an unnamed university in…
ATLANTA — August 20, 2024: ​​Cyble, a global leader in digital risk protection services (DRPS) and threat exposure management, announces…
Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. “These attacks…
A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads like Gh0st RAT…