It is worth noting that critical exploits could sell on the darknet for far worth more than what a nominal bounty payout may entail. Earlier this year, a Zoom zero-day exploit was being sold for $500,000.... Read More
A privilege escalation vulnerability had been lurking in the Linux kernel all this time until being discovered by a Palo Alto Networks researcher last week.... Read More
In the U.S., Cyber Security Awareness Month (NCSAM) is observed in the month of October. This is the time to get better equipped with cybersecurity... Read More
Fulton, MD – Sonatype, the company that scales DevOps through open source governance and software supply chain automation, today unveils its breakthrough Advanced Development Pack that... Read More
A newly discovered Microsoft Office 365 phishing campaign makes the recipient solve Google reCaptchas to both add some legitimacy to itself and evade detection systems.... Read More
Popular workplace messaging app Slack is down for multiple users across the globe, or experiencing subpar performance.... Read More
Italian security researcher, Carlo Di Dato discovered that the hidden URL API routes as those shown below can allow a web scraper or bot to enumerate every single Gravatar profile and collect its public data.... Read More
Telegram is being actively used by malware authors targeting e-commerce websites built on Prestashop, Magento and WooCommerce.... Read More
Multiple NodeJS packages laden with malicious code have been spotted on npm registry. These “typosquatting” packages served no purpose other than collecting data from the... Read More
This month security researcher bohops demonstrated a credential harvesting trick that uses Windows theme files. Setting a Windows wallpaper location to a file present at a remote... Read More
Share this: