Python Libraries Exploited for Malicious Intent

A recent report by Xavier Mertens, a Senior ISC Handler and cybersecurity consultant, highlights a concerning trend ...

WordPress to Require Two-Factor Authentication for Plugin Developers

WordPress will require two-factor authentication for plugin developers starting October 1, 2024. This mandate will also ...

Mastercard Acquires Global Threat Intelligence Firm Recorded Future

In an effort to bolster the insights and intelligence used to secure today’s digital economy, Mastercard has agreed to ...

ColorTokens Buys Identity Security Provider PureID

ColorTokens has acquired identity security provider PureID to enhance its microsegmentation platform, Xshield. The ...

Apple Drops Spyware Case Against NSO Group, Citing Risk of Threat Intelligence Exposure

Apple has filed a motion to “voluntarily” dismiss its lawsuit against commercial spyware vendor NSO Group, ...

GitLab Warns of Critical Pipeline Execution Vulnerability

GitLab released updates covering versions 17.1.7, 17.2.5, and 17.3.2 for GitLab Community Edition (CE) and Enterprise ...

TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud

Cybersecurity researchers at Cleafy discovered a new variant of the TrickMo Android banking trojan that evades analysis ...

Fileless Remcos RAT Campaign Leverages CVE-2017-0199 Flaw

In a newly uncovered advanced malware campaign, threat actors are using a complex, fileless approach to deliver the ...

1 14 15 16 17 18 19 20 21 22 23 24 667