The venerable cryptographic hash function has vulnerabilities that make its further use inadvisable....
1 Comment
As a part of the periodic review of NIST’s cryptographic standards and guidelines, NIST’s Crypto...
NIST is introducing a plan to transition away from the current limited use of the...
In January 2022, NIST’s Crypto Publication Review Board initiated a review process for NIST Special Publication (SP)...
A previously undocumented Android malware campaign has been observed leveraging money-lending apps to blackmail victims...
Web applications, often in the form of Software as a Service (SaaS), are now the...
NuGet, PyPi, and npm ecosystems are the target of a new campaign that has resulted...
The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 48 domains that...
Phishing campaigns involving the Qakbot malware are using Scalable Vector Graphics (SVG) images embedded in HTML email...
A new Go-based botnet has been spotted scanning and brute-forcing self-hosted websites using the WordPress...
Microsoft on Tuesday disclosed it took steps to suspend accounts that were used to publish...
Protecting customer data is critical for any business accepting online payment information. The Payment Card...
Tech giant Microsoft released its last set of monthly security updates for 2022 with fixes for...
The U.S. National Security Agency (NSA) on Tuesday said a threat actor tracked as APT5 has been...
Apple on Tuesday rolled out security updates to iOS, iPadOS, macOS, tvOS, and Safari web...
An update on the work to make Principles Based Assurance (PBA) usable in practice....
Google on Tuesday announced the open source availability of OSV-Scanner, a scanner that aims to offer...
The NIST Cybersecurity Risk Analytics Team is hosting a workshop to provide an overview of...
2 Comments
A critical security flaw has been disclosed in Amazon Elastic Container Registry (ECR) Public Gallery...
Cybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that’s deliberately designed...
An active malware campaign is targeting the Python Package Index (PyPI) and npm repositories for...
Fortinet on Monday issued emergency patches for a severe security flaw affecting its FortiOS SSL-VPN...
High-severity security vulnerabilities have been disclosed in different endpoint detection and response (EDR) and antivirus...
With 2022 coming to a close, there is no better time to buckle down and...
Google has officially begun rolling out support for passkeys, the next-generation passwordless login standard, to its...
A cryptocurrency mining attack targeting the Linux operating system also involved the use of an...
As the holiday season approaches, online shopping and gift-giving are at the top of many...
The U.S. Department of Health and Human Services (HHS) has cautioned of ongoing Royal ransomware...
Travel agencies have emerged as the target of a hack-for-hire group dubbed Evilnum as part of a...
A new attack method can be used to circumvent web application firewalls (WAFs) of various...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.