CISA is alerting federal agencies in the U.S. of hackers exploiting a recently patched ScreenConnect vulnerability that could lead to executing remote code on the server. […] Go to Source Author: Ionut Ilascu
Category Archives: Security
Fashion retail giant Victoria’s Secret has delayed its first quarter 2025 earnings release because of ongoing corporate system restoration efforts following a May 24 security incident. […] Go to Source Author: Sergiu Gatlan
Google has released an emergency security update to fix the third Chrome zero-day vulnerability exploited in attacks since the start of the year. […] Go to Source Author: Sergiu Gatlan
The latest version of the ‘Crocodilus’ Android malware has introduced a new mechanism that adds a fake contact on the infected device’s contact list to deceive victims. […] Go to Source Author: Bill Toulas
Luxury fashion brand Cartier is warning customers it suffered a data breach that exposed customers’ personal information after its systems were compromised. […] Go to Source Author: Lawrence Abrams
Outdoor apparel retailer The North Face is warning customers that their personal information was stolen in credential stuffing attacks targeting the company’s website in April. […] Go to Source Author: Bill Toulas
American cybersecurity company SentinelOne revealed over the weekend that a software flaw triggered a seven-hour-long outage on Thursday. […] Go to Source Author: Sergiu Gatlan
Google says it will no longer trust root CA certificates signed by Chunghwa Telecom and Netlock in the Chrome Root Store due to a pattern of compliance failures and failure to make improvements. […] Go to Source Author: Bill Toulas
Microsoft and CrowdStrike announced today that they’ve partnered to connect the aliases used for specific threat groups without actually using a single naming standard. […] Go to Source Author: Sergiu Gatlan
Bring your own device (BYOD) policies are transforming workplaces by offering employees the flexibility and convenience of using their preferred personal devices for work. However, each device also presents a potential entry point for cyberthreats. As BYOD becomes the norm, effective security measures are essential to protect data without sacrificing flexibility. Follow these tips for […]

