Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Jun 20, 2024NewsroomFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of…
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
Jun 20, 2024NewsroomThreat Intelligence / Cybercrime A new Rust-based information stealer malware…
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
Jun 19, 2024NewsroomCybercrime / Crypto Security Crypto exchange Kraken revealed that an…
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
Jun 19, 2024NewsroomZero-Day Exploits / Cyber Espionage The China-nexus cyber espionage actor…
Signal Foundation Warns Against EU’s Plan to Scan Private Messages for CSAM
Jun 18, 2024NewsroomPrivacy / Encryption A controversial proposal put forth by the…
2025 CISO Plans and Priorities
Seventy percent of enterprises are prioritizing investment in SaaS security by establishing…
ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
Jun 17, 2024NewsroomRouter Security / Vulnerability ASUS has shipped software updates to…
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
Jun 17, 2024NewsroomWeb Security / Malware Legitimate-but-compromised websites are being used as…
Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
Jun 15, 2024Newsroom Pakistan has become the latest target of a threat…