Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
Jul 29, 2024Ravie LakshmananEnterprise Security / Data Protection Cybersecurity company Acronis is…
How Searchable Encryption Changes the Data Security Game
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream…
Critical Flaw in Telerik Report Server Poses Remote Code Execution Risk
Jul 26, 2024NewsroomSoftware Security / Vulnerability Progress Software is urging users to…
CrowdStrike Warns of New Phishing Scam Targeting German Customers
CrowdStrike is alerting about an unfamiliar threat actor attempting to capitalize on…
Ongoing Cyberattack Targets Exposed Selenium Grid Services for Crypto Mining
Jul 26, 2024Newsroom Cybersecurity researchers are sounding the alarm over an ongoing…
U.S. DoJ Indicts North Korean Hacker for Ransomware Attacks on Hospitals
The U.S. Department of Justice (DoJ) on Thursday unsealed an indictment against…
Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials
Jul 27, 2024NewsroomCybersecurity / Cloud Security Cybersecurity researchers have discovered a malicious…
French Authorities Launch Operation to Remove PlugX Malware from Infected Systems
Jul 27, 2024NewsroomMalware / Cyber Intelligence French judicial authorities, in collaboration with…
This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps
A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing…


