-
Security
/ 1 month agoCompromised dYdX npm and PyPI Packages Deliver Malware
Cybersecurity researchers have identified a software supply chain attack targeting developers working with the dYdX decentralized exchange. Malicious actors have compromised...
-
Security
/ 1 month agoSamsung Knox Addresses Mobile Security in Evolving Enterprise Networks
Enterprise network security has undergone significant evolution over the past decade, with more intelligent firewalls, advanced threat detection, and detailed access...
-
Security
/ 1 month agoIranian Hackers Resume Operations with New Infrastructure
A sophisticated Iranian cyber threat group has resumed its activities with updated infrastructure, following a period of reduced visibility that coincided...
-
Security
/ 1 month agoAI Security Gap Widens as Enterprise Use Outpaces Controls
A significant gap has emerged between the rapid adoption of artificial intelligence tools in business environments and the security measures designed...
-
Security
/ 1 month agoCybersecurity Threats Emerge from Developer Tools and Cloud Services
Security researchers have identified a series of emerging cyber threats targeting software development environments, remote administration tools, and cloud infrastructure. These...
-
Security
/ 1 month agoBotnet Sets Record with 31.4 Tbps DDoS Attack
A distributed denial-of-service botnet known as AISURU or Kimwolf has been linked to a record-breaking cyberattack that reached a peak of...
-
Security
/ 1 month agoMalicious NGINX Configurations Hijack Web Traffic
cybersecurity researchers have uncovered an ongoing, large-scale campaign that is hijacking web traffic by compromising NGINX web servers and related management...
-
Security
/ 1 month agoCritical n8n Vulnerability Allows Remote Code Execution
A critical security vulnerability in the popular n8n workflow automation platform could allow attackers to execute arbitrary system commands on affected...
-
Security
/ 1 month agoEarly Decisions in First 90 Seconds Critical to Incident Response
The initial moments following the detection of a security breach are now widely regarded as the most critical phase of any...
-
Security
/ 1 month agoOrchid Security Launches Continuous Identity Observability Platform
A cybersecurity firm has introduced a new platform designed to provide continuous monitoring of identity usage within enterprise software applications. The...

