This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Articles
Addressing the Unpatched Critical RCE Vector, Fortinet
Fortinet has released a patch addressing a severe security flaw in its Wireless LAN Manager that security researcher Zach Hanley i...
Urgent Chrome Update Released to Address Critical Secur...
Google has rolled out an important security update for Chrome to address five vulnerabilities that could potentially allow attacke...
Critical Siemens UMC Flaw Enables Remote Code Execution...
A critical vulnerability (CVE-2024-49775) has been discovered in Siemens’ User Management Component (UMC), which could allow unaut...
New Malware Attacks OT/ICS Engineering Workstations
Security researchers have identified a growing cybersecurity threat targeting industrial systems through engineering workstations,...
Sophos Issues Critical Security Updates for Firewall Pr...
Sophos has deployed urgent security patches to fix three vulnerabilities in their firewall products, including two critical flaws ...
The Black Friday Breach: How the Biggest Holiday Cybera...
In what became known as one of retail's darkest holiday seasons, Target Corporation fell victim to a devastating cyberattack durin...
20,000 European Users Are the Target of HubPhish's Cred...
Security analysts have uncovered a sophisticated phishing operation dubbed "HubPhish" by Palo Alto Networks Unit 42, which targete...
A New Cyber Insurance Consortium Is Launched By Lloyd'...
Organizations That Are Certified By HITRUST Are Eligible For Special Coverage And Prices Under The Program.
Critical Authentication Bypass Vulnerability in Hitachi...
A severe authentication bypass vulnerability (CVE-2024-10205) has been discovered in Hitachi’s Infrastructure Analytics Advisor an...
Even Great Companies Get Breached — Understanding the A...
The digital landscape is fraught with an uncomfortable truth that many organizations are reluctant to acknowledge: no company, reg...
130 Foreign Nationals And Nigerians Are Arrested By Pol...
IGP Directs Networking And Potential Security Risk To Be Carefully Investigated.
Hackers Use Webview2 to Install CoinLurker Malware and ...
Threat actors are using phony software update lures to spread CoinLurker, a new stealer virus. In a technical paper released on Mo...