Researchers Spot XZ Utils Backdoor in Dozens of Docker Hub Images, Fueling Supply Chain Risks
New research has uncovered Docker images on Docker Hub that contain the infamous XZ Utils backdoor, more than a year…
New research has uncovered Docker images on Docker Hub that contain the infamous XZ Utils backdoor, more than a year…
Cybersecurity researchers are warning of a “significant spike” in brute-force traffic aimed at Fortinet SSL VPN devices. The coordinated activity,…
An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers,…
A previously undocumented threat actor dubbed Curly COMrades has been observed targeting entities in Georgia and Moldova as part of…
Cybersecurity researchers have discovered a fresh set of security issues in the Terrestrial Trunked Radio (TETRA) communications protocol, including in…
This week, cyber attackers are moving quickly, and businesses need to stay alert. They’re finding new weaknesses in popular software…
Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH as early as…
The Evolution of Exposure Management Most security teams have a good sense of what’s critical in their environment. What’s harder…
The maintainers of the WinRAR file archiving utility have released an update to address an actively exploited zero-day vulnerability. Tracked…
A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the world to create…