India CERT-In New Guidelines

India CERT-In New Guidelines

India's CERT-In, published new guidelines that require service providers, intermediaries, data centers, and government entities to compulsorily report cybersecurity incidents, including data breaches, within six hours. The types of incidents…
HackerOne Acquires PullRequest

HackerOne Acquires PullRequest

HackerOne acquired PullRequest, the pioneer of code-review-as-a-service.PullRequest’s technology and code reviewers will enable developer-first security testing solutions. These changes will ultimately help customers release trustworthy software faster by embedding expert security…
Microsoft Chromium Edge VPN in Preview Mode

Microsoft Chromium Edge VPN in Preview Mode

Microsoft will be retiring IE on June 15. The company has shifted its focus to maintaining and developing the Chromium-based Edge browser. Microsoft rolls out new Edge features fairly often, though some of them…
Bumblebee malware the new Sophisticated Buzz

Bumblebee malware the new Sophisticated Buzz

Multiple waves of attacks are underway that feature a sophisticated new malware loader dubbed Bumblebee, stealthier by nature that fetches shellcode and second-stage tools, such as Cobalt Strike, Sliver, and Meterpreter possibly…
CISA: Top Exploited Vulnerabilities 2021

CISA: Top Exploited Vulnerabilities 2021

CISA has published the list of 2021’s top 15 most exploited software vulnerabilities. This joint Cybersecurity Advisory (CSA) was co-authored by cybersecurity agencies of the United States, Australia, Canada, New…
DDoS hits Ukraine Exploiting WordPress Bug

DDoS hits Ukraine Exploiting WordPress Bug

Cybercriminals have injected malicious scripts into compromised WordPress websites that weaponize the browsers of unsuspecting visitors to conduct DDoS attacks on Ukrainian targets. Security researchers identified a compromised WordPress website…