APT group Witchetty (aka LookingFrog) has exploited the ProxyShell and ProxyLogon vulnerabilities to gain initial access and deploy new custom cyber tools against government agencies and a stock exchange.
Read moreXSS Flaw in Prevalent Media Imaging Tool Exposes Trove of Patient Data
September 29 2022Bugs in Canon Medical's Virea View could allow cyberattackers to access several sources of sensitive patient data.
Read moreWhat Lurks in the Shadows of Cloud Security?
September 29 2022Organizations looking to get ahead in cloud security have gone down the path of deploying CSPM tooling with good results. Still, there’s a clear picture that data security and...
Read moreDifferences in App Security/Privacy Based on Country
September 29 2022Depending on where you are when you download your Android apps, it might collect more or less data about you.
The apps we downloaded from Google Play also showed...
Read more
Fake Accounts Are Not Your Friends!
September 28 2022Inflated user bases and fake engagement cause more harm than good, especially when the artificial accounts are based on stolen human identities.
Read moreThe average cost of a data-exposing cybersecurity incident is $4.35 million. If your business can’t avoid to pay, make sure you’ve got a strong data loss prevention practice in...
Read moreGoogle Quashes 5 High-Severity Bugs With Chrome 106 Update
September 28 2022External researchers contributed 16 of the 20 security updates included in the new Chrome 106 Stable Channel rollout, including five high-severity bugs.
Read moreSophisticated Covert Cyberattack Campaign Targets Military Contractors
September 28 2022Malware used in the STEEP#MAVERICK campaign features rarely seen obfuscation, anti-analysis, and evasion capabilities.
Read moreFast Company CMS Hack Raises Security Questions
September 28 2022The company's website remains offline after hackers used its compromised CMS to send out racist messages.
Read moreContainer Supply Chain Attacks Cash In on Cryptojacking
September 28 2022Cloud-native threats are costing cloud customer victims money as cryptojackers mine their vulnerable cloud instances.
Read more
Recent Comments