Act Now: CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability

Jan 12, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has ...

Bitwarden Adds Passkey Support to Log Into Web Password Vaults

Passkeys in Bitwarden are generated using the PRF WebAuthn extension, which derives a unique encryption key from the ...

Nation-State Actors Weaponize Ivanti VPN Zero-Days, Deploying 5 Malware Families

Jan 12, 2024NewsroomVulnerability / Threat Intelligence As many as five different malware families were deployed by ...

Fake Recruiters Defraud Facebook Users via Remote Work Offers

A fresh wave of job scams is spreading on Meta’s Facebook platform that aims to lure users with offers for ...

Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion

The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a ...

Further analysis of Denmark attacks leads to warning about unpatched network gear

What happened in Denmark can also happen to you, cybersecurity researchers are warning in a new report that examines ...

Applying the Tyson Principle to Cybersecurity: Why Attack Simulation is Key to Avoiding a KO

Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances ...

Urgent: GitLab Releases Patch for Critical Vulnerabilities – Update ASAP

Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates to address two critical ...

1 388 389 390 391 392 393 394 395 396 397 398 658