CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products

Mar 26, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on ...

Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others

Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as ...

Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account

Mar 25, 2024The Hacker NewsData Breach / Password Security In January 2024, Microsoft discovered they’d been the ...

New “GoFetch” Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys

A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during ...

Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks

Mar 25, 2024NewsroomCyber Espionage / Email Security The Iran-affiliated threat actor tracked as MuddyWater (aka Mango ...

Threat actors leverage document publishing sites for ongoing credential and session token theft

Cisco Talos Incident Response (Talos IR) has observed the ongoing use of legitimate digital document publishing (DDP) ...

French Unemployment Agency Data Breach Impacts 43 Million People

The stolen data includes sensitive personal details such as full name, date of birth, social security number, and ...

White House meets with UnitedHealth, industry groups on Change Healthcare cyberattack fallout

Dive Brief: Officials from the White House and the U.S. Department of Health and Human Services held a meeting on ...

1 277 278 279 280 281 282 283 284 285 286 287 660