Cybersecurity firm Check Point has urged customers to review their VPN configurations to prevent potential exploitation by ...
Recording software used in courtroom environments has been found to contain a backdoored installer that allows attackers to ...
Researchers from Zscaler ThreatLabz observed an uptick in the TeaBot Andoird banking Trojan, also known as Anatsa ...
A recent security audit of the Slider Revolution plugin has uncovered two significant vulnerabilities that could compromise the security of WordPress websites. Slider Revolution, a widely used premium ...
Source code of fake Pegasus spyware is being sold on the surface web, the dark web and instant messaging platforms, CloudSEK ...
GitHub has issued an update to fix a critical vulnerability in its GitHub Enterprise Server (GHES) with a maximum CVSS score ...
According to Proofpoint’s inaugural Data Loss Landscape Report, CISOs have faced a growing array of cyber-threats and ...
Over half of CISA’s known exploited vulnerabilities disclosed since February 2024 have not yet been analyzed by NIST’s ...
The Police Service of Northern Ireland (PSNI) would have faced a crippling fine of £5.6m for a serious data breach last year ...
Since October 2023, Check Point Research (CPR) has been monitoring Void Manticore, also known as Storm-842, which has been ...
According to Enea, these campaigns use cloud storage platforms to host malicious websites, sending links via SMS to bypass firewalls ...
Four of the most used generative AI chatbots are highly vulnerable to basic jailbreak attempts, researchers from the UK AI ...