A high severity cross-site request forgery (CSRF) bug allows attackers to take over WordPress sites running an unpatched version of…
Browsing: Threat Intelligence
In a blog post, security researchers said that many mobile operators aren’t asking the difficult security questions to ensure the caller…
Iran has already demonstrated intent and capability to attack inside the US as well as a high tolerance for escalating…
It has been reported that over 200 industrial companies were affected by an info-stealing APT campaign. The victims of advanced persistent threat (APT) group…
It has been reported that Lazarus, an advanced persistent threat (APT) group, has expanded its reach with the development and use of a…
Hundreds of industrial companies are currently the targets of cyber-espionage activity from an advanced threat actor. The adversary uses a new…
Cybereason, creators of the leading Cyber Defense Platform, today released an investigative research report from its Nocturnus Research Group titled ‘Dropping…
In light of WADA’s sporting ban of Russia, cyber security experts at ThreatConnect have warned that WADA itself, as well as the…
The UK general election is almost upon us, and it is already turning into one of the most divisive and…
The Department of Homeland Security has just refreshed its list of the 25 Most Common Software Weaknesses: here’s the DHS intro…