The United States Cybersecurity and Infrastructure Security Agency (CISA) has officially added two critical vulnerabilities to its Known Exploited Vulnerabilities catalogue. These vulnerabilities have...
What is Application Security
Application security is a crucial aspect of software development that aims to protect the application code and the data it handles...
Businesses worldwide faced significant disruptions as a recent CrowdStrike update caused Windows workstations to crash, leading to the infamous “blue screen of death.” CrowdStrike...
A vulnerability tracked as CVE-2024-39929 with a CVSS score of 9.1, has been addressed. This flaw previously allowed threat actors to craft and deliver...
Researchers have discovered ViperSoftX, a sophisticated malware previously detected by Fortinet in 2020, lurking within torrents disguised as eBooks. ViperSoftX dynamically loads and runs...
Cybersecurity professionals have uncovered a sophisticated supply chain attack involving GitHub, npm, and jsDelivr code repositories. The attacker cleverly embedded malware within the rarely...
Apple recently yielded to government pressure and removed several virtual private network (VPN) apps from the Russian App Store. The action affected 25 mobile...
Cybersecurity researchers recently confirmed the existence of Zergeca, a powerful botnet written in Golang. Unlike typical DDoS botnets, Zergeca boasts an impressive array of...
An unsealed indictment charges four Vietnamese nationals with involvement in a series of cyber intrusions that collectively caused U.S. companies to suffer over $71...
Recent investigations by cybersecurity experts have unveiled the operations of 'Markopolo', a sophisticated cybercriminal mastermind orchestrating extensive cryptocurrency thefts. This threat actor has been...
According to cybersecurity researchers, the Indian government is currently under attack by a suspected Pakistan-based possible state-sponsored threat actor. The report suggests the threat...
A report from CISA confirmed adding an actively exploited security flaw tagged CVE-2017-3506with CVSS score of 7.4 affecting the Oracle WebLogic Server to the...
A statement by Okta confirms the possibility of cross-origin authentication. It warns customers that they might become victims of this Customer Identity Cloud (CIC)...
Cybersecurity researchers and dark web trackers have brought security agencies’ attention to the return of the famous cybercriminal called BreachForum. This is happening barely...
Cybersecurity researchers have uncovered the actions of Transparent Tribe, a Pakistani-linked threat actor, who used malware written in Python, Golang, and Rust to attack...
As part of plans to favour the release of more advanced alternative applications such as JavaScript and PowerShell, Microsoft on Wednesday announced the deprecation...
According to cybersecurity researchers, a loophole in llama_cpp_python python package tagged CVE-2024-34359 with a CVSS score of 9.7 could result in exploitation by threat actors. One of the...
Cybercriminals (Possibly Russian-speaking threat actors from the Commonwealth of Independent States) impersonating 1Password, Bartender 5 and Pixelmator software and fake Github profiles and repositories begin...
A recent discovery by cybersecurity researchers revealed an ongoing social engineering campaign targeting and attacking enterprises with massive spam emails aiming to achieve access...