Access to hacked corporate networks still strong but sales fall
Statistics collected by cyber-intelligence firm KELA during this year's second quarter show that marketplaces selling initial access to corporate networks…
Statistics collected by cyber-intelligence firm KELA during this year's second quarter show that marketplaces selling initial access to corporate networks…
Threat actors can abuse weaknesses in HTTP request handling to launch damaging browser-based attacks on website users, researcher says.
A member of the Cuba ransomware operation is employing previously unseen tactics, techniques, and procedures (TTPs), including a novel RAT…
Microsoft says that some of the Exchange Server flaws addressed as part of the August 2022 Patch Tuesday also require…
Attackers abused open redirects on the websites of Snapchat and American Express in a series of phishing attacks to steal Microsoft 365…
By Bryan Alsdorf, Director of IT and Head of Information Security, MariaDB Corporation To paraphrase a mantra popularized […] The…
What issues are cybersecurity professionals concerned about in 2022? You tell us!
Cisco has fixed critical security vulnerabilities affecting Small Business VPN routers and enabling unauthenticated, remote attackers to execute arbitrary code…
Microleaves, a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, exposed their…
System administrators have even less time to patch disclosed security vulnerabilities than previously thought, as a new report shows threat…