All posts tagged "cybersecurity"
-
Security
/ 4 weeks agoRussian APT28 Group Uses BEARDSHELL, COVENANT Malware Against Ukraine
A Russian state sponsored hacking group known as APT28 has deployed two new malware families, BEARDSHELL and COVENANT, to conduct long...
-
Security
/ 4 weeks agoReducing Attack Surface Can Mitigate Zero-Day Threats
Security experts are emphasizing that organizations can proactively reduce their risk from critical software vulnerabilities, known as zero-days, by minimizing their...
-
Security
/ 4 weeks agoKadNap Malware Infects 14,000 Devices for Proxy Botnet
Security researchers have identified a new malware campaign that has compromised more than 14,000 network edge devices, primarily Asus routers, to...
-
Security
/ 4 weeks agoAI Agent Security Risks Prompt Calls for New Audit Protocols
The rapid adoption of autonomous artificial intelligence systems, known as AI agents, has introduced significant new data security vulnerabilities that require...
-
Security
/ 4 weeks agoCISA Flags Three Critical Flaws as Actively Exploited
The U.S. cybersecurity and Infrastructure Security Agency (CISA) updated its public catalog of security vulnerabilities on Monday, adding three specific flaws...
-
Security
/ 4 weeks agoSalesforce Warns of Mass-Scanning Attacks on Experience Cloud
Security teams at Salesforce are alerting customers to a significant increase in malicious scanning activity targeting misconfigured public sites built on...
-
Security
/ 4 weeks agoMalicious Chrome Extensions Enable Code Injection After Ownership Change
Two Google Chrome browser extensions have been compromised following an apparent transfer of ownership, security researchers report. The extensions, which were...
-
Security
/ 4 weeks agoSecurity Platforms Evolve to Meet Mid-Market Business Demands
Mid-sized companies are increasingly adopting advanced security platforms to meet stringent requirements set by clients and partners. This trend is driven...
-
Security
/ 4 weeks agoCybersecurity Week: Zero-Day Flaws, iOS Exploits, and Novel Attacks
A series of significant cybersecurity threats and developments emerged globally during the past week, involving critical vulnerabilities in major technology platforms...
-
Security
/ 4 weeks agoNorth Korean Hackers Breach Crypto Firm via Trojanized File
A North Korean state-sponsored hacking group is suspected of orchestrating a sophisticated cloud compromise against a cryptocurrency organization in 2025, resulting...

