Critical Atlassian Confluence bug exploited in Cerber ransomware attacks
Attackers are exploiting a recently patched and critical severity Atlassian Confluence authentication bypass flaw to encrypt victims' files using Cerber…
Attackers are exploiting a recently patched and critical severity Atlassian Confluence authentication bypass flaw to encrypt victims' files using Cerber…
One of the oldest malware tricks in the book -- hacked websites claiming visitors need to update their Web browser…
Cybersecurity's constant stream of shiny new things shouldn't distract managers from their focus on the people they're protecting.
A new campaign involving the delivery of proxy server apps to Windows systems has been uncovered, where users are reportedly…
In separate targeted incidents, threat actors tried to upload malware into the Node Package Manager registry to gain access and…
Exploiting a flaw in how the app handles communication with external tenants gives threat actors an easy way to send…
Security researchers have found a simple way to deliver malware to an organization with Microsoft Teams, despite restrictions in the…
Apple has recently addressed a vulnerability that lets attackers with root privileges bypass System Integrity Protection (SIP) to install "undeletable"…
It's as they say: A Teams is only as strong as its weakest links. Microsoft's collaboration platform offers Tabs, Meetings,…
Some of the victims affected by the 3CX supply chain attack have also had their systems backdoored with Gopuram malware,…