General Security News
-
CISA Issues Warning on Active Exploitation of ZK Java Web Framework Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw affecting the ZK Framework to its Known Exploited...
-
LastPass Reveals Second Attack Resulting in Breach of Encrypted Password Vaults
LastPass, which in December 2022 disclosed a severe data breach that allowed threat actors to access encrypted password vaults, said it happened as...
-
Researchers Share New Insights Into RIG Exploit Kit Malware's Operations
The RIG exploit kit (EK) touched an all-time high successful exploitation rate of nearly 30% in 2022, new findings reveal. "RIG EK is a...
-
Media Gaint News Corp Says Hackers Had Access to Network for Two Years
On January 20, 2022, News Corp identified cyberattacks on a business email and document storage system utilized by numerous News Corp businesses....
-
Hackers Weaponizing New Critical Flaw to Attack Zoho ManageEngine Products
Since January 20, 2023, there have been several instances where malicious entities have been observed exploiting a significant security...
-
Nearly 80% Of Google Play Store Apps ‘Violating Data Privacy Labels’ – Mozilla
According to a Mozilla analysis, the majority of the top apps’ data privacy labels on the Google Play Store are false or deceptive. “Google Play...
-
Dutch Police Arrest 3 Hackers Involved in Massive Data Theft and Extortion Scheme
The Dutch police announced the arrest of three individuals in connection with a "large-scale" criminal operation involving data theft, extortion,...
-
Google Teams Up with Ecosystem Partners to Enhance Security of SoC Processors
Google said it's working with ecosystem partners to harden the security of firmware that interacts with Android. While the Android operating system...
-
How to Tackle the Top SaaS Challenges of 2023
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies like Nissan and Slack, it's...
-
Hackers Use Open-Source Tools to Attack Shipping Companies & Medical Laboratories
There has been an emergence of a new security threat that has been causing havoc among the Asian shipping and medical laboratory industries. It’s...
-
NSA Released Checklist To Secure Home Wi-Fi Network
Cybercriminals can breach the security of your home WiFi and potentially cause you significant harm. Your home network may be used by malicious...
-
Hackers Using Trojanized macOS Apps to Deploy Evasive Cryptocurrency Mining Malware
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems. Jamf Threat Labs,...