This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Articles
Amazon Cognito Updates Are Released by AWS
The identity and access management solution for Web and mobile applications, Amazon Cognito, has been updated by Amazon Web Servic...
Russian RomCom Hackers Chain Firefox and Windows Zero-D...
RomCom, a Russian-aligned cybercrime group, has leveraged two zero-day vulnerabilities in Firefox and Windows Task Scheduler in a ...
Critical Vulnerabilities in Anti-Spam Plugin Expose Ove...
Two critical vulnerabilities in the CleanTalk Anti-Spam plugin for WordPress, used by over 200,000 sites, expose them to remote at...
A Data Breach Has Affected Santander In Spain
A Data Breach Has occurred at the international bank Santander in Spain
Apple Addresses Critical Zero-Day Exploits in macOS and...
Apple has issued emergency security updates to address two critical zero-day vulnerabilities in JavaScriptCore and WebKit, affecti...
Cyber Surge In Africa
Globally, cybercrime has increased dramatically in recent years, with the number of successful hacks more than doubling over the p...
five dispersed Spider Gang members were charged in a mu...
Indicted in the United States are five notorious cybercrime team that attacks businesses.
Apple Fixes Actively Exploited Zero-Days Immediately
Although there is little information available about the vulnerabilities, the business did report that hackers have targeted Intel...
Apache Kafka Vulnerability Allows Attackers to Escalate...
A newly discovered vulnerability, CVE-2024-31141, in Apache Kafka Clients, could enable attackers to escalate their privileges, po...
Varonis Issues Warning After Major Vulnerability Found ...
Varonis has uncovered a high-risk vulnerability (CVE-2024-10979) in the PostgreSQL PL/Perl extension, which enables users to modif...
This Holiday Season, Cyberthreats That May Affect the R...
Retail companies are preparing for their yearly spike in online (and in-store) traffic as the holidays get near. Regrettably, hack...
DoS, model theft, and poisoning could be made possible ...
Researchers studying cybersecurity have identified six security holes in the Ollama artificial intelligence (AI) framework that a ...