Cyber mercenaries in countries like India, Russia, and the UAE are carrying out data theft and hacking...
Mois : juin 2022
A recent analysis of breaches involving application programming interfaces (APIs) arrives at some eye-popping damage figures, but...
It didn’t have to be this way: So far 2022’s tranche of zero-days shows too many variants...
Malicious ISS module exploitation is the latest trend among threat actors targeting Exchange servers, analysts say.
Publishing giant Macmillan was forced to shut down their network and offices while recovering from a security...
NXM Announces Platform That Protects Space Infrastructure and IoT Devices From Cyberattacks

1 min read
NXM Autonomous Security protects against network-wide device hacks and defends against critical IoT vulnerabilities.
A password link that didn’t expire leads to the discovery of exposed personal information at a payments...
Titaniam’s ‘State of Data Exfiltration & Extortion Report’ also finds that while over 70% of organizations had...
A newly discovered lightweight and persistent malware was used by attackers to backdoor Microsoft Exchange servers belonging...
Critical ManageEngine ADAudit Plus Vulnerability Allows Network Takeover, Mass Data Exfiltration

1 min read
An unauthenticated remote code execution vulnerability found in Zoho’s compliance tool could leave organizations exposed to an...