-
Security
/ 1 month agoMeta Disables 150,000 Accounts in Global Scam Network Crackdown
Meta Platforms Inc. disabled more than 150,000 accounts on its social media platforms this week as part of a coordinated international...
-
Security
/ 1 month agoCritical n8n Vulnerabilities Enable Remote Code Execution
cybersecurity researchers have disclosed two critical security vulnerabilities in the n8n workflow automation platform that have now been patched. The flaws,...
-
Security
/ 1 month agoAI Browser Tricked into Phishing Scam in Under Four Minutes
Security researchers have demonstrated that an AI-powered web browser can be manipulated into performing a phishing scam in less than four...
-
Security
/ 1 month agoMalicious Rust Crates Target Developer Secrets via CI/CD
Cybersecurity researchers have identified a coordinated campaign involving five malicious software packages, or “crates,” in the Rust programming language ecosystem. These...
-
Security
/ 1 month agoSupply Chain Attack via nx npm Package Leads to AWS Breach
A threat actor identified as UNC6426 used credentials stolen during a software supply chain attack to gain administrative control over a...
-
Security
/ 1 month agoMicrosoft Fixes 84 Security Holes, Two Zero-Days in March Update
Microsoft released its monthly security updates on Tuesday, addressing a total of 84 newly discovered vulnerabilities across its software ecosystem. The...
-
Security
/ 1 month agoRussian APT28 Group Uses BEARDSHELL, COVENANT Malware Against Ukraine
A Russian state sponsored hacking group known as APT28 has deployed two new malware families, BEARDSHELL and COVENANT, to conduct long...
-
Security
/ 1 month agoReducing Attack Surface Can Mitigate Zero-Day Threats
Security experts are emphasizing that organizations can proactively reduce their risk from critical software vulnerabilities, known as zero-days, by minimizing their...
-
Security
/ 1 month agoGoogle Looker Studio Flaws Allowed Cross-Tenant Data Access
Cybersecurity researchers have disclosed a set of nine critical vulnerabilities in Google Looker Studio, a business intelligence and data visualization platform....
-
Security
/ 1 month agoKadNap Malware Infects 14,000 Devices for Proxy Botnet
Security researchers have identified a new malware campaign that has compromised more than 14,000 network edge devices, primarily Asus routers, to...

