Phishing scams are going to be a lot harder to pull off in Google's family of apps now, Google will now show a warning banner in Google Docs, Sheets, and…
India's CERT-In, published new guidelines that require service providers, intermediaries, data centers, and government entities to compulsorily report cybersecurity incidents, including data breaches, within six hours. The types of incidents…
HackerOne acquired PullRequest, the pioneer of code-review-as-a-service.PullRequest’s technology and code reviewers will enable developer-first security testing solutions. These changes will ultimately help customers release trustworthy software faster by embedding expert security…
Microsoft will be retiring IE on June 15. The company has shifted its focus to maintaining and developing the Chromium-based Edge browser. Microsoft rolls out new Edge features fairly often, though some of them…
Users of Synology and QNAP NAS devices are advised to be on the lookout for patches for several critical vulnerabilities affecting Netatalk, an open-source implemention of the Apple Filing Protocol (AFP)…
Multiple waves of attacks are underway that feature a sophisticated new malware loader dubbed Bumblebee, stealthier by nature that fetches shellcode and second-stage tools, such as Cobalt Strike, Sliver, and Meterpreter possibly…
CISA has published the list of 2021’s top 15 most exploited software vulnerabilities. This joint Cybersecurity Advisory (CSA) was co-authored by cybersecurity agencies of the United States, Australia, Canada, New…
Cybercriminals have injected malicious scripts into compromised WordPress websites that weaponize the browsers of unsuspecting visitors to conduct DDoS attacks on Ukrainian targets. Security researchers identified a compromised WordPress website…