Subscribe to Updates
Subscribe to our newsletter and be the first to access exclusive content and expert insights.
Browsing: ransomware malware
July 25, 2024NewsroomCloud Security/Vulnerabilities Cybersecurity researchers have disclosed a privilege escalation vulnerability affecting Google Cloud Platform’s Cloud Functions service that could be exploited by attackers to…
July 25, 2024Hacker NewsBrowser Security / Enterprise Security The browser is the nerve center of the modern workplace. Yet ironically, it is also one of the…
July 25, 2024NewsroomDNS Security/Vulnerabilities The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain…
July 25, 2024NewsroomBrowser Security / Data Protection Google has announced that it will add a new security warning when downloading suspicious or potentially malicious files via…
July 25, 2024NewsroomContainer Security/Vulnerabilities Docker is warning about a critical flaw affecting certain versions of Docker Engine that could allow attackers to bypass authentication plugins (AuthZ)…
A zero-day security vulnerability in Telegram’s Android mobile app, EvilVideo, could allow attackers to send malicious files disguised as harmless-looking videos. According to ESET, the exploit…
July 24, 2024NewsroomCyber Espionage/Threat Intelligence A threat actor known as Patchwork has been found to be involved in cyber attacks targeting organisations with links to Bhutan,…
July 24, 2024Hacker NewsSaaS Management/IT Governance There’s one simple factor behind the modern explosion of SaaS adoption: productivity. We’ve reached an age where purpose-built tools exist…
July 24, 2024NewsroomSoftware Updates/IT Outages Cybersecurity firm CrowdStrike said on Wednesday that a major outage last weekend that crashed millions of Windows devices was caused by…
July 24, 2024NewsroomVulnerabilities / Software Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog…