Data Security Fabric: A New Approach in Securing Enterprise Data
The statement that data is the currency of the digital age could not be truer these days. Data is now so valuable that threat actors are always trying to steal,Read More →
The statement that data is the currency of the digital age could not be truer these days. Data is now so valuable that threat actors are always trying to steal,Read More →
Last week two zero-day flaws, CVE-2022-41040 and CVE-2022-41082, impacting Microsoft Exchange Server were revealed by the Vietnamese security firm GTSC. Microsoft later added the confirmation that the zero-day flaws affectingRead More →
RecordTV a news channel in Brazil suffered a cyber attack this Saturday morning that left the company’s network down. The attackers, who used the ransomware attack and stole personal dataRead More →
LibreOffice is a free and open-source office productivity software suite, a project of The Document Foundation. It was forked in 2010 from OpenOffice.org, an open-sourced version of the earlier StarOffice. Read More →
The leader in virtualization and cloud computing technologies, VMware, has released a security fix for two vulnerabilities in its vCenter Server software that might help attackers target numerous enterprises likeRead More →
Twelve new security flaws impacting various chipsets were disclosed in this month’s security advisory for Qualcomm’s devices, two of which have been given a critical severity rating.Two significant flaws inRead More →
Ferrari has suffered an attack that has resulted in 7 GB of stolen company information. The cyberattack has been produced and claimed by the ‘RansomEXX’ cybercriminal group, known for itsRead More →
Researchers have at last cracked the PlayStation’s security after nearly two years of work. The PS5 has been jailbroken and completely unlocked, making this the device’s first serious hack sinceRead More →
A security investigator has discovered three new code execution flaws in the Linux kernel that might be exploited by a local or external adversary to take control of the vulnerableRead More →
A software development life cycle is also called an application development life cycle. It describes the processes of software development from planning to maintenance. The processes are in six stages;Read More →
The Mexican president, Andrés Manuel López Obrador, acknowledged this Friday that the Army suffered a hack that led to the leak of tens of thousands of documents that include informationRead More →
A “security incident” affecting several of its code repositories has been published by Auth0, an authentication service provider and Okta subsidiary. More than 2,000 corporate clients from 30 countries, utilizeRead More →
By deploying a new Trojan named LOWZERO, integrated into an espionage campaign aimed against Tibetan organizations, the Chinese APT known as TA413 is exploiting a variety of flaws in MicrosoftRead More →
A well-known tool in the security sector for classifying and identifying malware samples is YARA. Avast just gave the open-source community two tools. YARA Language Server and YaraNG are technologiesRead More →
A hacker who allegedly targeted Optus, Australia’s second-largest telecom company, and stole the personal information of millions of Australians, has posted more material online. In the past, the hacker demandedRead More →
A rumor about the arrest of Chinese President Xi Jinping surfaced on Twitter last weekend. The source of this false information was exiled Chinese opponents in the United States. RumorsRead More →
The Chile Judiciary issued a cyber security alert for ransomware on its network and asked officials not to open or read emails or messages “of dubious origin.” This incident affected the systems withRead More →
Data breaches, loss of reputation, fines for non-compliance, and many more damaging consequences can all happen because of the lack of cybersecurity measures. A common misconception is that startups areRead More →
Two security flaws in WhatsApp’s chat app for iOS and Android that might have been used to remotely execute malware on the device were recently reported by the company Meta. CVE-2022-36934,Read More →
In recent months, hackers utilizing the Noberus (also known as BlackCat, ALPHV) ransomware have been using new techniques, tools, and procedures (TTPs), making the situation even more serious. The usageRead More →