National Vulnerability Backlog Could Surge to 30,000 by 2025

The National Vulnerability Database (NVD), maintained by the National Institute of Standards and Technology (NIST), ...

Acronis Warns of Cyber Infrastructure Default Password Abused in Attacks

The vulnerability (CVE-2023-45249) was patched nine months ago but is still being exploited in attacks. Admins are ...

Data From Deleted Github Repositories May Not Actually be Deleted

Researchers at Truffle Security have found, or arguably rediscovered, that data from deleted GitHub repositories (public ...

Gh0stGambit Dropper Used to Deploy Gh0st RAT Against Chinese Users

The Gh0st RAT Trojan is being distributed to Chinese Windows users through a fake Chrome website. The malware has been ...

AI-Generated Deepfake Attacks Force Companies To Reassess Cybersecurity

Companies are reevaluating their cybersecurity defenses in response to the rise of AI-generated deepfake attacks and ...

How Searchable Encryption Changes the Data Security Game

Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals ...

Targeted PyPI Package Steals Google Cloud Credentials from macOS Devs

The malware is designed to target only 64 specific machines, attempting to exfiltrate Google Cloud Platform credentials ...

Most CISOs Feel Unprepared for New Compliance Regulations

Most CISOs are feeling unprepared for new compliance regulations, such as the SEC’s cybersecurity disclosure rules in ...

1 104 105 106 107 108 109 110 111 112 113 114 667