Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…
Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things…
Identity verification probably wasn’t top of mind when you started your shiny new consumer tech startup. You were focused on…
The Akira ransomware group, which first appeared in March 2023, has been identified as a serious threat to data security.…
A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware. Trickbot, a suite of malware tools,…
Phishing bots are a tool used by hackers to fool people into disclosing private information such as- Login credentials Financial…
The Andariel threat group has been discovered installing malware via the exploitation of the Apache ActiveMQ remote code execution vulnerability…
AutoZone Inc., a US retailer of automotive parts and accessories, warned customers that their data had been compromised as a…
It has been discovered that there is a high-severity vulnerability in Dell Command Configure that could potentially be exploited by…
A new high-severity vulnerability has been discovered in multiple Cisco products, which could potentially allow HTTP/2 Rapid Reset Attack. This…