by Beck Bailey | Jan 25, 2024 | RSS
Learn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.
by Beck Bailey | Jan 25, 2024 | RSS
The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security flaws, including a critical bug that, if successfully exploited, could result in remote code execution (RCE)....
by Beck Bailey | Jan 25, 2024 | RSS
Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that’s distributed via spear-phishing attacks. The findings come from Japanese company ITOCHU Cyber & Intelligence, which said the malware “has been updated with...
by Beck Bailey | Jan 25, 2024 | RSS
The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from the platform’s surveillance of the Surface, Deep, and Dark Web with insights derived from the in-depth research and...
by Beck Bailey | Jan 25, 2024 | RSS
A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests from legitimate software to deliver a sophisticated implant named NSPX30. Slovak cybersecurity firm ESET is tracking the...
Recent Comments