The vulnerability was being exploited in the wild, targeting two versions of Adobe ColdFusion.
Read moreControversial Cybercrime Law Passes in Jordan
August 23 2023The increase in cyberattacks against the Middle East in the last few years has pressured Jordan and other nations to better secure their infrastructures.
Read moreMalware aimed at macOS is no longer just a knockoff of a Windows bug, as a new infostealer proliferating on Mac laptops demonstrates.
Read moreMakers of vulnerable apps that are exploited in wide-scale supply chain attacks need to improve software security or face steep fines and settlement fees.
Read moreWhen Leadership Style Is a Security Risk
August 23 2023Risk-aware leaders can be a cybersecurity advantage. Their flexible leadership style and emphasis on security first help set the tone and demonstrate a commitment to avoiding risk.
Read moreThe Physical Impact of Cyberattacks on Cities
August 22 2023Understanding potential threats and regularly updating response plans are the best lines of defense in the new world of cyberattacks.
Read more‘Cuba’ Ransomware Group Uses Every Trick in the Book
August 22 2023How a Russian cybercrime group using Cuban Revolution references and iconography has emerged as one of the most profitable ransomware operations.
Read moreChinese APT Targets Hong Kong in Supply Chain Attack
August 22 2023Dubbed Carderbee, the group used legitimate software and Microsoft-signed malware to spread the Korplug/PlugX backdoor to various Asian targets.
Read moreSecurity vendor will not say if attackers are already actively exploiting the flaw, as some reports have claimed.
Read more
Recent Comments