Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Jun 20, 2024NewsroomFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of…
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
Jun 20, 2024NewsroomThreat Intelligence / Cybercrime A new Rust-based information stealer malware…
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
Jun 19, 2024NewsroomCybercrime / Crypto Security Crypto exchange Kraken revealed that an…
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
Jun 19, 2024NewsroomZero-Day Exploits / Cyber Espionage The China-nexus cyber espionage actor…
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
Jun 18, 2024NewsroomMalware / Cybercrime Threat actors are luring unsuspecting users with…
Signal Foundation Warns Against EU’s Plan to Scan Private Messages for CSAM
Jun 18, 2024NewsroomPrivacy / Encryption A controversial proposal put forth by the…
2025 CISO Plans and Priorities
Seventy percent of enterprises are prioritizing investment in SaaS security by establishing…
China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
Jun 17, 2024NewsroomCyber Espionage / Vulnerability A suspected China-nexus cyber espionage actor…
ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
Jun 17, 2024NewsroomRouter Security / Vulnerability ASUS has shipped software updates to…