16.7 C
Munich
Saturday, May 4, 2024

News

Palo Alto PAN-OS Flaw Added to CISA’s “Known Exploited Vulnerabilities Catalog”

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw impacting Palo Alto Networks PAN-OS to its Known Exploited Vulnerabilities Catalog, based on...

GitLab Patches Critical Vulnerability

GitLab has released a security update to address a critical vulnerability that may lead to remote code execution. The vulnerability is tracked as CVE-2022-2884 and...

Data Breaches Reach All-Time High

According to a new IBM security report, the global average cost of data breaches reached $4.35 million in 2022 which is an all time...

Hacker claims to have obtained data of 1 billion Chinese citizens

Even though China has vowed to improve the protection of online user data, instructing their tech companies to ensure safe storage of information, a...

Three New Web Application Security Risks Climb Up The OWASP Top 10

OWASP Top 10 is a standard awareness document which represent a consensus about the most critical security risks to web applications. For the year 2021,...

Apple Releases Patches Fixing 39 Vulnerabilities

In recent security updates released on March 14, Apple releases patches fixing 39 vulnerabilities several of which could allow an attacker to execute arbitrary...

Cyberattack Crashes Israeli Government Websites

Users unable to reach sites with gov.il extension for an hour, as National Cyber Directorate reportedly declares state of emergency over incident. Communications Minister Yoaz...

Email Which Claims to Come from Saudi Aramco Delivers Malware

MalwareBytes research team found a targeted email campaign carrying two attachments, a pdf file and an excel file. The email pretends to come from Saudi...

Retailer Blames Third-Party for the Data Breach of More than 100,000 Payment Cards

Beauty product retailer Acro revealed that customers of two of its websites were impacted, exposing more than 100,000 payment cards. The attack compromised the...

How to Secure Your Microservices

Compared to monolithic applications, which house all code in a single system, microservices are small, autonomous units that address individual functions and work with...

War Between Russia and Ukraine Goes Cyber

The war between Russia and Ukraine goes "Cyber", with several ongoing cyber-attacks from the Russian side, targeting Ukraine's banks and government department websites. A cyber...

Update Chrome Now to Patch an Actively Exploited Zero-Day Vulnerability

Google has released an update for its Chrome browser that includes eleven security fixes, one of which has been reportedly exploited in the wild....

Latest