CISA ADDS ANDROID PIXEL AND SUNHILLO SURELINE BUGS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG Security U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Android Pixel… rooter March 6, 2024 2 min read 0
CVE-2024-27198 and CVE-2024-27199 Detection: Critical Vulnerabilities in JetBrains TeamCity Pose Escalating Risks with Exploits Underway Threats A couple of months after the massive exploitation of CVE-2023-42793,… rooter March 6, 2024 3 min read 0
Watch out, GhostSec and Stourmous groups jointly conducting ransomware attacks Security Researchers warn that the cybercrime groups GhostSec and Stormous have… rooter March 6, 2024 3 min read 0
Surveillance through Push Notifications Security The Washington Post is reporting on the FBI’s increasing use… rooter March 6, 2024 2 min read 0
LockBit 3.0’s Bungled Comeback Highlights the Undying Risk of Torrent-Based (P2P) Data Leakage Security The wide torrent-based accessibility of these leaked victim files ensures… rooter March 6, 2024 4 min read 0
Cloud Apps Make the Case for Pen-Testing-as-a-Service News Applications are increasingly distributed, expanding companies' cloud attack surfaces and… rooter March 6, 2024 1 min read 0
MITRE Rolls Out 4 Brand-New CWEs for Microprocessor Security Bugs News Goal is to give chip designers and security practitioners in… rooter March 6, 2024 1 min read 0
Hugging Face AI Platform Riddled With 100 Malicious Code-Execution Models News The finding underscores the growing risk of weaponizing publicly available… rooter March 6, 2024 1 min read 0
MTTR: The Most Important Security Metric News Measuring and tracking your mean time to remediate shows whether… rooter March 6, 2024 1 min read 0
Ransomware-as-a-Service Spawns Wave of Cyberattacks in Middle East & Africa News Experts advise organizations in the region to refuse to pay… rooter March 6, 2024 1 min read 0