Cybersecurity

bg
High-Severity Flaw in PostgreSQL Allows Hackers to Exploit Environment Variables

High-Severity Flaw in PostgreSQL Allows Hackers to Expl...

Cybersecurity researchers have disclosed a high-severity security flaw in the Po...

bg
Bitfinex Hacker Sentenced to 5 Years, Guilty of Laundering $10.5 Billion in Bitcoin

Bitfinex Hacker Sentenced to 5 Years, Guilty of Launder...

Ilya Lichtenstein, who pleaded guilty to the 2016 hack of cryptocurrency stock e...

bg
CISA Flags Two Actively Exploited Palo Alto Flaws; New RCE Attack Confirmed

CISA Flags Two Actively Exploited Palo Alto Flaws; New ...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday war...

bg
Palo Alto Advises Securing PAN-OS Interface Amid Potential RCE Threat Concerns

Palo Alto Advises Securing PAN-OS Interface Amid Potent...

Palo Alto Networks on Friday issued an informational advisory urging customers t...

bg
Bitcoin Fog Founder Sentenced to 12 Years for Cryptocurrency Money Laundering

Bitcoin Fog Founder Sentenced to 12 Years for Cryptocur...

The 36-year-old founder of the Bitcoin Fog cryptocurrency mixer has been sentenc...

bg
Webinar: Learn How Storytelling Can Make Cybersecurity Training Fun and Effective

Webinar: Learn How Storytelling Can Make Cybersecurity ...

Let’s face it—traditional security training can feel as thrilling as reading the...

bg
Comprehensive Guide to Building a Strong Browser Security Program

Comprehensive Guide to Building a Strong Browser Securi...

The rise of SaaS and cloud-based work environments has fundamentally altered the...

bg
OvrC Platform Vulnerabilities Expose IoT Devices to Remote Attacks and Code Execution

OvrC Platform Vulnerabilities Expose IoT Devices to Rem...

A security analysis of the OvrC cloud platform has uncovered 10 vulnerabilities ...

bg
Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs

Microsoft Fixes 90 New Flaws, Including Actively Exploi...

Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN M...

bg
Iranian Hackers Use "Dream Job" Lures to Deploy SnailResin Malware in Aerospace Attacks

Iranian Hackers Use "Dream Job" Lures to Deploy SnailRe...

The Iranian threat actor known as TA455 has been observed taking a leaf out of a...

Ce site utilise des cookies pour améliorer votre expérience de navigation. En continuant à utiliser ce site, vous consentez à l'utilisation de cookies. Veuillez consulter notre politique de confidentialité pour plus d'informations sur la façon dont nous traitons vos données.