vulnerabilities
-
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Jun 28, 2024NewsroomMalware / Cryptocurrency Security researchers have shed more light on the cryptocurrency mining operation conducted by the 8220…
Read More » -
Combatting the Evolving SaaS Kill Chain: How to Stay Ahead of Threat Actors
The modern kill chain is eluding enterprises because they aren’t protecting the infrastructure of modern business: SaaS. SaaS continues to…
Read More » -
New SnailLoad Attack Exploits Network Latency to Spy on Users’ Web Activities
Jun 28, 2024NewsroomNetwork Security / Data Protection A group of security researchers from the Graz University of Technology have demonstrated…
Read More » -
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
Jun 28, 2024NewsroomIndustrial Security / Critical Infrastructure Multiple security flaws have been disclosed in Emerson Rosemount gas chromatographs that could…
Read More » -
New MOVEit Transfer Vulnerability Under Active Exploitation – Patch ASAP!
Jun 26, 2024NewsroomVulnerability / Data Protection A newly disclosed critical security flaw impacting Progress Software MOVEit Transfer is already seeing…
Read More » -
Practical Guidance For Securing Your Software Supply Chain
The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their…
Read More » -
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Jun 24, 2024NewsroomVulnerability / Artificial Intelligence Google has developed a new framework called Project Naptime that it says enables a…
Read More » -
Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
Jun 24, 2024NewsroomArtificial Intelligence / Cloud Security Cybersecurity researchers have detailed a now-patch security flaw affecting the Ollama open-source artificial…
Read More » -
RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations
Jun 24, 2024NewsroomCyber Espionage / Hacking A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign…
Read More »