Critical cryptographic flaws in top E2EE cloud platforms risk user data, allowing file tampering and injection.
The attack chain, per Positive Technologies, is an attempt to exploit CVE-2024-37383 (CVSS score: 6.1), a stored cross-site ...
North Korean IT workers posing as freelancers steal data from Western firms, demanding ransoms for its return.
DLP (Data Loss Prevention): As a cornerstone of data security, DLP ensures that sensitive data, such as personally ...
The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE-2024-44133. It was addressed by Apple as part of ...
Crypt Ghouls target Russian businesses and agencies using LockBit 3.0 and Babuk ransomware for financial gain.
The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw ...
Fake Google Meet pages deliver malware targeting Windows and macOS, spreading infostealers via ClickFix campaign.
Group-IB reveals Cicada3301 ransomware’s affiliate panel, targeting U.S. and U.K. sectors with cross-platform attacks.
SideWinder APT launches stealthy multi-stage attacks, deploying StealerBot malware against critical entities in the Middle ...
Cybersecurity and intelligence agencies from Australia, Canada, and the U.S. have warned about a year-long campaign ...
Jetpack, owned by WordPress maker Automattic, is an all-in-one plugin that offers a comprehensive suite of tools to improve ...