Researchers have discovered the series of events that lead to the "ctx Python" library being seeded with code that sought to steal the AWS secret keys of anyone who included…
JFrog, a DevOps company has introduced Project Pyrsia, an open-source software community initiative that uses blockchain technology to secure software packages from vulnerabilities and malicious code. Project Pyrsia is an open-source-based, decentralized,…
Indian low-cost airline SpiceJet Ltd. was forced to cancel flights on Wednesday, May 24, 2022, following a ransomware attack. SpiceJet officially describes it as an “attempted ransomware attack,” but you…
The Port of London Authority has become the latest victim of a cyberattack that caused the forced shut down of its website, the company confirmed on May 24th, 2022. Check Point…
Google has released updates for the Chrome browser that includes 32 security fixes, including one critical bug The stable channel was 102.0.5005.61/62/63 for Windows, and 102.0.5005.61 for Mac and Linux. Google…
A bunch of bugs identified in Zoom that can be exploited to compromise another user over chat by sending specially crafted Extensible Messaging and Presence Protocol (XMPP) messages. Below are…
The CISA has added 41 flaws to its Known Exploited Vulnerabilities Catalog, including recently addressed issues in the Android kernel (CVE-2021-1048 and CVE-2021-0920) and Cisco IOS XR (CVE-2022-20821). The Cisco…
General Motors (GM) has said it has suffered a credential stuffing attack. During the attack customer information and reward points were stolen on the online platform used by Chevrolet, Buick,…