493 Companies Share Their SaaS Security Battles – Get Insights in this Webinar
In today's digital world, security risks are more prevalent than ever, especially when it comes to Software as a Service (SaaS) applications. Did you...
Urgent: Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws
Apple has released security updates to address several security flaws, including two vulnerabilities that it said have been actively exploited in the wild.The shortcomings...
Ubuntu ‘command-not-found’ Tool Could Trick Users into Installing Rogue Packages
Cybersecurity researchers have found that it's possible for threat actors to exploit a well-known utility called command-not-found to recommend their own rogue packages and...
CISA Urges Manufacturers Eliminate Default Passwords to Thwart Cyber Threats
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging manufacturers to get rid of default passwords on internet-exposed systems altogether, citing severe risks...
Social engineering scam in cryptocurrency exchange hits GoDaddy staff
GoDaddy employees were exploited to attack waves on multiple cryptocurrency exchanges through social engineering and phishing.
Staff at the name registrar were subject to a...
Microsoft Warns of Hackers Exploiting OAuth for Cryptocurrency Mining and Phishing
Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines (VMs) for cryptocurrency mining and launch phishing...
WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability
WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited by threat actors by combining it with...
Russian COLDRIVER Hackers Expand Beyond Phishing with Custom Malware
The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential harvesting to deliver its first-ever custom malware...
Multiple Security Vulnerabilities Found In Fiber Home Routers
At smallest 28 secondary passage accounts and individual various weaknesses individual been found effective the firmware of a popular FTTH ONT switch, wide sent...
Sudo vulnerability allows attackers to gain root privileges on Linux systems
A weakness (CVE-2021-3156) in sudo, an incredible and close pervasive open-source utility utilized on significant Linux and Unix-like working frameworks, could permit any unprivileged...