‘Void Banshee’ Exploits Second Microsoft Zero-Day
Attackers have been using the Windows MSHTML Platform spoofing vulnerability in conjunction with another zero-day flaw. Attackers have been using…
Ivanti Cloud Bug Goes Under Exploit After Alarms Are Raised
Three days after Ivanti published an advisory about the high-severity vulnerability CVE-2024-8190, threat actors began to abuse the flaw. Three…
Name That Toon: Tug of War
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.…
Legacy Ivanti Cloud Service Appliance Being Exploited
CISA wants everyone—and government agencies in particular—to remove or upgrade an Ivanti Cloud Service Appliance (CSA) that is no longer…
Cybersecurity & the 2024 US Elections
While the 2024 election may see various cyber threats, existing security measures and coordination across all levels of government aim…
North Korean Hackers Target Cryptocurrency Users on LinkedIn with RustDoor Malware
Cybersecurity researchers are continuing to warn about North Korean threat actors’ attempts to target prospective victims on LinkedIn to deliver…
Google Fixes GCP Composer Flaw That Could’ve Led to Remote Code Execution
A now-patched critical security flaw impacting Google Cloud Platform (GCP) Composer could have been exploited to achieve remote code execution…
Master Your PCI DSS v4 Compliance with Innovative Smart Approvals
The PCI DSS landscape is evolving rapidly. With the Q1 2025 deadline looming ever larger, businesses are scrambling to meet…