Enterprise software maker SAP on Tuesday announced the release of 14 new security notes as part of its January 2025 Patch Day ...
Ivanti VPNs are still exposed to attacks exploiting a recent vulnerability tracked as CVE-2025-0282 and Nominet has been ...
Attackers have been exploiting a second vulnerability in BeyondTrust’s remote management solutions, CISA warns.
Attackers are exploiting a critical vulnerability in Aviatrix Controller to execute arbitrary code in AWS cloud environments.
A threat actor has been observed abusing compromised AWS keys to encrypt data in S3 buckets and demand a ransom payment in exchange for the encryption keys, cybersecurity firm Halcyon reports. As part ...
According to a whitepaper from Redmond’s AI red team, tools like its open source PyRIT (Python Risk Identification Toolkit) ...
A fake proof-of-concept (PoC) exploit for a recent LDAP vulnerability distributes information stealer malware.
Infostealer malware allowed threat actors to compromise Telefonica employees’ credentials and access the company’s internal ticketing system.
Chinese cyberspies targeted offices dealing with foreign investments and sanctions in the recent US Treasury hack.
Juniper Networks has patched multiple high-severity vulnerabilities in Junos OS and its third-party components.
The US Justice Department has announced charges against three Russians for operating the Blender and Sinbad cryptocurrency mixers.
Developed with the help of AI, the emerging FunkSec ransomware claimed over 80 victims in December 2024. An emerging ransomware group named FunkSec has risen to fame after claiming responsibility for ...