Cybersecurity Blog
Magnet Goblin Hacker Group Leveraging 1-Day Exploits to Deploy Nerbian RAT
Mar 11, 2024NewsroomZero-Day / Endpoint Security A financially motivated threat actor called Magnet Goblin is swiftly ...
Canva Warns of Three Security Vulnerabilities in Fonts
The first, CVE-2023-45139, involved a high-severity bug in the FontTools library. The second and third vulnerabilities, ...
Tycoon and Storm-1575 Linked to Phishing Attacks on US Schools
Tycoon and Storm-1575 groups are identified as key players, with Tycoon offering MFA bypass as a service and Storm-1575 ...
Flaws in public records management tool could let hackers nab sensitive data linked to requests
A popular tool used by numerous state and local governments to manage public records requests contained defects that ...
New Malware Campaign Found Exploiting Stored XSS in Popup Builder < 4.2.3
In January, my colleague reported about a new Balada Injector campaign found exploiting a recent vulnerability in the ...
CISA adds Apple iOS and iPadOS memory corruption bugs to its Known Exploited Vulnerabilities Catalog
CISA adds Apple iOS and iPadOS memory corruption bugs to its Known Exploited Vulnerabilities Catalog Pierluigi Paganini ...
Microsoft Confirms Russian Hackers Stole Source Code, Some Customer Secrets
Mar 09, 2024NewsroomCyber Attack / Threat Intelligence Microsoft on Friday revealed that the Kremlin-backed threat ...
Law Enforcement Personnel Say LexisNexis Retaliated When Asked to Remove Data
More than 18,000 New Jersey law enforcement personnel are alleging that LexisNexis retaliated against them by freezing ...