Cyber Security
Fake Windows 10 updates are being used to distribute the Magniber ransomware in a massive campaign that started earlier this month. Over the past...
Hi, what are you looking for?
Fake Windows 10 updates are being used to distribute the Magniber ransomware in a massive campaign that started earlier this month. Over the past...
ARcare, a US healthcare provider with facilities in Arkansas, Kentucky, and Mississippi, has admitted a data breach potentially affecting 345,000 individuals. “On February 24, 2022, ARcare...
GitHub has revealed details of a security breach that has allowed an unknown attacker to download data from dozens of private code repositories. The attacker authenticated...
A new report from Microsoft has revealed that at least six separate Russian nation-state actors have launched damaging cyber-attacks against Ukraine since the invasion...
A group of software package maintainers have created a tool for defending applications that depend on open source JavaScript libraries. Called Socket, the tool...
FILE – People crowd under a destroyed bridge as they try to flee, crossing the Irpin river on the outskirts of Kyiv, Ukraine, Tuesday,...
Doubts have arisen about the veracity of research that purportedly demonstrates a serious vulnerability involving VirusTotal, a Google-owned antivirus comparison and threat intel service. VirusTotal (VT) offers...
A SQL injection (SQLi) vulnerability in an open source platform developed by Greek universities to manage student data left academic grades at risk of manipulation. Miscreants...
But, in general, the industry wants NIST to avoid making any changes at all to the choose-your-own-adventure document that has guided risk management and...
Intigriti has today announced a new program that will combine bug bounty hunting with penetration testing models to offer hackers payment by the hour...