Cybersecurity Blog
New Glibc Flaw Grants Attackers Root Access on Major Linux Distros
Jan 31, 2024NewsroomVulnerability / Endpoint Security Malicious local attackers can obtain full root access on Linux ...
Hackers Exploiting Ivanti VPN Flaws to Deploy KrustyLoader Malware
Jan 31, 2024NewsroomCyber Attack / Network Security A pair of recently disclosed zero-day flaws in Ivanti Connect ...
URGENT: Upgrade GitLab – Critical Workspace Creation Flaw Allows File Overwrite
Jan 30, 2024NewsroomDevSecOps / Vulnerability GitLab once again released fixes to address a critical security flaw in ...
Israeli Government: Smallest of SMBs Hit Hardest in Cyberattacks
Some 33,000 small and medium-size businesses in Israel experienced some form of cyberattack last year, with 7,000 ...
OpenAI says mysterious chat histories resulted from account takeover
Enlarge Getty Images OpenAI officials say that the ChatGPT histories a user reported result from his ChatGPT account ...
Brazilian Feds Dismantle Grandoreiro Banking Trojan, Arresting Top Operatives
Jan 30, 2024NewsroomCyber Crime / Malware A Brazilian law enforcement operation has led to the arrest of several ...
Threat Actors Selling 1.8TB Database of Indian Mobile Users
The database holds personal records of over 750 million Indian citizens, accounting for nearly half of the country’s 1.4 ...
URGENT: Upgrade GitLab – Critical Workspace Creation Flaw Allows File Overwrite
Jan 30, 2024NewsroomDevSecOps / Vulnerability GitLab once again released fixes to address a critical security flaw in ...