
Cybersecurity and Threat Management
Three security flaws in the open source PHP package Voyager have been discovered that an attacker could exploit to gain .etc
The North Korean threat actor Lazarus Group was observed using a “web-based administration platform” to supervise its command-and control (C2) .etc
Researchers from the Georgia Institute of Technology (GIT) and Ruhr University Bochum (Ruhr U. Bochum) have demonstrated two new side .etc
Ransomware attacks are on an unprecedented scale, exposing vulnerabilities in the healthcare industry that put millions of people at risk. .etc
Cacti, an open-source framework for network monitoring and fault management, has a critical security flaw that could allow an attacker .etc
A Mirai botnet version dubbed Aquabot was observed actively trying to exploit a security flaw of medium severity impacting Mitel .etc
Cybersecurity researchers have drawn attention to an attack on the software supply chain that targets the Go ecosystem. The malicious .etc
Microsoft has released patches that address two critical-rated security vulnerabilities affecting Azure AI Face Service, Microsoft Account and Microsoft Account. .etc