Cybersecurity Blog
Microsoft says Russian hackers stole source code after spying on its executives
Microsoft/ Tech / Microsoft’s nation-state security incident continues to be a headache for the company. By Tom Warren, ...
Lithuania warns China has ramped up espionage campaigns
China has escalated its intelligence сampaigns against Lithuania, recruiting local spies and using cyber tools to gather ...
UK: Jersey Regulator’s Data Breach Leaks Names and Addresses
The leak did not connect individuals to registered entities or roles, and the organization is working with the Jersey ...
Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability
Mar 11, 2024NewsroomNetwork Security / Vulnerability Technical specifics and a proof-of-concept (PoC) exploit have ...
Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT
Mar 11, 2024NewsroomZero-Day / Endpoint Security A financially motivated threat actor called Magnet Goblin is swiftly ...
Canva Warns of Three Security Vulnerabilities in Fonts
The first, CVE-2023-45139, involved a high-severity bug in the FontTools library. The second and third vulnerabilities, ...
Tycoon and Storm-1575 Linked to Phishing Attacks on US Schools
Tycoon and Storm-1575 groups are identified as key players, with Tycoon offering MFA bypass as a service and Storm-1575 ...
Flaws in public records management tool could let hackers nab sensitive data linked to requests
A popular tool used by numerous state and local governments to manage public records requests contained defects that ...