Cybersecurity Blog
CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products
Mar 26, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on ...
Hackers Hijack GitHub Accounts in Supply Chain Attack Affecting Top-gg and Others
Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers as ...
Key Lesson from Microsoft’s Password Spray Hack: Secure Every Account
Mar 25, 2024The Hacker NewsData Breach / Password Security In January 2024, Microsoft discovered they’d been the ...
New “GoFetch” Vulnerability in Apple M-Series Chips Leaks Secret Encryption Keys
A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during ...
Iran-Linked MuddyWater Deploys Atera for Surveillance in Phishing Attacks
Mar 25, 2024NewsroomCyber Espionage / Email Security The Iran-affiliated threat actor tracked as MuddyWater (aka Mango ...
Threat actors leverage document publishing sites for ongoing credential and session token theft
Cisco Talos Incident Response (Talos IR) has observed the ongoing use of legitimate digital document publishing (DDP) ...
French Unemployment Agency Data Breach Impacts 43 Million People
The stolen data includes sensitive personal details such as full name, date of birth, social security number, and ...
White House meets with UnitedHealth, industry groups on Change Healthcare cyberattack fallout
Dive Brief: Officials from the White House and the U.S. Department of Health and Human Services held a meeting on ...