The U.S. cybersecurity agency has added Oracle WebLogic Server Vulnerability CVE-2017-3506 to its Known Exploited ...
While a report from cybersecurity firm Hudson Rock previously implied that the breach of Ticketmaster and Santander Bank may ...
Notorious DarkGate malware has shifted to using AutoHotkey for its last stages, making detection even more challenging.
The landscape of browser security has undergone significant changes over the past decade. While Browser Isolation was once ...
Russian organizations are at the receiving end of cyber attacks that have been found to deliver a Windows version of a malware called Decoy Dog. Cybersecurity company Positive Technologies is tracking ...
Critical security flaw discovered in Progress Telerik Report Server (CVE-2024-4358, CVSS 9.8/10). Remote attackers could bypass authentication.
The starting point of the attack is the Excel document that, when launched, displays content in Ukrainian and urges the victim to "Enable Content" in order to activate macros. It's worth noting that ...
Fight tool sprawl and alert fatigue with a security solution built for the cloud. Navigating the NIST AIRisk Management Framework In this guide, we will provide a comprehensive overview of AI risk, ...
Discover how AI is transforming enterprise security and the associated risks in Cato's latest SASE Threat Report.
North Korea-linked threat actor Andariel is using a new Golang-based backdoor called Dora RAT to target educational and ...
A new suspicious package named "glup-debugger-log" has been discovered on the npm registry, designed to drop a RAT on ...
From Threat Intel to Protection in 5 Minutes. Prelude Security enables defenses to be autonomously updated at machine speed.