Class action litigation claims administration firm Arden Claims Service is notifying about 139,000 individuals that their…
Why LinkedIn Developed Its Own AI-Powered Security Platform
LinkedIn has responsibility for a billion global users across a massive hardware estate at a time…
Google Play Bug Bounty Program Shutting Down
Google will soon shut down the Google Play Security Reward Program (GPSRP) after determining that it…
Thousands of Apps Using AWS ALB Exposed to Attacks Due to Configuration Issue
As many as 15,000 apps that use AWS’s Application Load Balancer (ALB) for authentication could be…
Microsoft Copilot Studio Vulnerability Led to Information Disclosure
A vulnerability in Microsoft Copilot Studio could be exploited to access sensitive information on the internal…
China-Linked ‘Velvet Ant’ Hackers Exploited Zero-Day to Deploy Malware on Cisco Nexus Switches
Further evidence has surfaced of sophisticated actors increasingly compromising edge devices and network appliances to improve…
Understanding the ‘Morphology’ of Ransomware: A Deeper Dive
Understanding the visible landscape is more accurate when we understand the underlying morphology that shapes the…
CISA Warns of Exploited Vulnerabilities Impacting Dahua Products
The US cybersecurity agency CISA this week issued a warning over the exploitation of two critical-severity…
Atlassian Patches Vulnerabilities in Bamboo, Confluence, Crowd, Jira
Atlassian has published its August 2024 security bulletin, which details nine high-severity vulnerabilities impacting Bamboo, Confluence,…
Cisco Patches High-Severity Vulnerability Reported by NSA
Cisco on Wednesday announced patches for multiple vulnerabilities across its products, including a high-severity bug in…