Veracode Unleashes New Tools at AWS re:Invent
In an era where cybersecurity threats loom large, Veracode Inc. has made significant strides in integrating security into the software…
Microsoft Threat Intelligence Center reports a supply chain attack by a North Korean hacking group
In a recent development, Microsoft Threat Intelligence Center has reported a sophisticated supply chain attack orchestrated by a North Korean…
SysAid Technologies Ltd. Becomes the Target of a Sophisticated Cyber Attack
In a rapidly evolving cybersecurity landscape, a new threat emerges: SysAid Technologies Ltd., a renowned IT service management company, faces…
Mr. Cooper Confirms Customer Data Breach
Mortgage servicer Mr. Cooper has confirmed that customer data was compromised in a recent cyberattack. The company says it is…
Stealthy GootBot Variant Sidesteps Enterprise Security
Cybersecurity circles are abuzz as a recently unearthed malware variant, dubbed GootBot, emerges as a formidable threat to corporate networks.…
Palo Alto Acquires Talon, Enhances Browser Security
The cybersecurity landscape has taken a significant turn with Palo Alto Networks Inc.'s latest acquisition of the Israeli company, Talon…
Okta Enforces New Security Protocols After Session Hijack Strikes
In a significant security incident, Okta, a leading identity and authentication management provider, disclosed a breach impacting 134 of its…
Elektra-Leak and ServiceNow: Alarm Bells for Critical Data Leaks
A concerning revelation has emerged with EleKtra-Leak's campaign focusing on exposed Amazon Web Service (AWS) IAM credentials in public GitHub…
Okta Breach Exposes Customer Data as Quasar RAT Targets Windows
Identity services giant, Okta, recently announced a security breach in its support case management system. The unidentified culprits used stolen…
Are Modern Technologies and Cybersecurity Truly in Sync?
In the rapidly changing digital world, innovation and security are perpetually intertwined. On one hand, there are technological juggernauts like…