Apple Releases iOS Update for Older iPhones to Fix Actively Exploited Vulnerability
Apple has released a new iOS 12 build for customers using the older models of iPhones, iPads and even iPod. The software update comes with a fix for security vulnerability [...]
New Golang-based ‘Agenda Ransomware’ Can Be Customized For Each Victim
Cybersecurity company Trend Micro is raising the alarm on a new ransomware family called Agenda, which has been used in attacks on organizations in Asia and Africa. Agenda Ransomware Agenda targets [...]
Google Launches New Open Source Bug Bounty to Tackle Supply Chain Attacks
Google on Tuesday announced it's launching a new bug bounty program that focuses specifically on open-source software. The payouts will range from $100 to $31,337 depending on the severity of the [...]
Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers
The danger actor behind the SolarWinds source chain attack has been connected to still a further “extremely specific” publish-exploitation malware that could be utilized to manage persistent accessibility to compromised [...]
Okta Hackers Behind Twilio and Cloudflare Breach Hit Over 130 Organizations
The threat actor behind the attacks on Twilio and Cloudflare earlier this month has been linked to a broader phishing campaign aimed at 136 organizations that resulted in a cumulative [...]
Get Social