Cyber Security

Proxy Trojan Targets macOS Users for Traffic Redirection

A sophisticated proxy Trojan targeting macOS has been discovered and is being distributed through pirated versions of genuine business software, including editing tools,...

Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers

Dec 06, 2023NewsroomVulnerability / Web Server Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a high-severity Adobe ColdFusion...

Russia’s ‘Star Blizzard’ APT Upgrades Its Stealth, Only to Be Unmasked Again

After multiple exposures and disruptions, a Kremlin-sponsored advanced persistent threat (APT) actor has once again upgraded its evasion techniques. However, that move was...

Scaling Security Operations with Automation

In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various security threats. However, limited resources often hinder security...

Medical Imaging Patients Exposed in Cyber Incident

Right before Thanksgiving, East River Medical Imaging (ERMI) began sending letters to impacted individuals concerning a data security incident that it experienced.On Sept....

Over 30% of Log4J apps use a vulnerable version of the library

Roughly 38% of applications using the Apache Log4j library are using a version vulnerable to security issues, including Log4Shell, a critical vulnerability identified...

Latest articles