Elastic Stack API Security Vulnerability Exposes Customer and System Data
The mis-implementation of Elastic Stack, a collection of open-source products that employ APIs for crucia…
The mis-implementation of Elastic Stack, a collection of open-source products that employ APIs for crucia…
Experts believe that the arrest of Ilya Sachkov, the founder and CEO of Group-IB, will not affect the compan…
In the past few years, two-factor verification is one of the simplest ways for users to safeguard their a…
Kaspersky security researchers have unearthed a new backdoor likely designed by the Nobelium advanced per…
Recently a ransomware attack targeted a leading book supplier software, the attack interrupted regular fu…
In the latest Profero report - Senior Incident Responder Brenton Morris states that RansomeXX decryptors …
Authorities in the United States charged a Turkish national for launching distributed denial-of-service (…
A new malware named GriftHorse is said to have infected over 10 million Android cell phones. According to…
Cybersecurity experts have discovered a new hacker group ChamelGang, which attacks institutions in ten count…
Internet scammers are using Twitter bots to trick users into making PayPal and Venmo payments to accounts…
Within the last couple of days, Bandwidth.com has been the latest target of distributed denial of service…
Researchers from Microsoft Threat Intelligence Center (MSTIC) identified FoggyWeb, a new custom malware u…
Just as the US was completing its withdrawal from Afghanistan, several China-linked cyberespionage groups…
The Japanese government on Tuesday officially approved a new three-year cybersecurity strategy, where Russia…
Cybersecurity researcher at Comparitech has identified a misconfigured MongoDB database containing a trea…
A fully working exploit for the remote code execution vulnerability in VMware vCenter labelled as CVE-202…
One of the prominent targets for hackers is Microsoft Exchange, and the attack vector typically involves …
Hackers have used a credential phishing attack to steal data from Office 365, Google Workspace, and Micro…
Positive Technologies is developing a new concept of cyber security standard. The document should become an …
At least five French ministers and President Emmanuel Macron's diplomatic advisor mobile phones have …