Network SecurityBackdoor in utility commonly used by Linux distros risks SSH compromiseThe critical supply chain threat affects beta releases of Red Hat Fedora, Debian and more.
Network SecurityPyPI halts new projects, users for 10 hours due to infostealer influxTyposquatting attack installed malicious packages to harvest credentials and crypto wallet data.
Network Security‘TheMoon’ malware shows its dark side, grows to 40,000 bots from 88 countriesMalware first identified in 2014 re-emerges and gets delivered by the criminal proxy service Faceless, now growing at 7,000 users per week.
Network SecurityGoogle: Zero-day exploits increasingly target enterprise technologiesAn analysis found threat actors are increasingly targeting enterprise-specific technologies.
Network SecurityFortinet FortiClient EMS SQL injection flaw exploited in the wildA PoC exploit is available for the critical flaw, which was added to CISA’s KEV catalog Monday.
Network SecurityFlaw in Ray AI framework potentially leaks sensitive data of workloadsThreat actor targets AI workloads, believed to be first exploited in the wild.
Cloud SecurityCall for 2024 SC Awards nominationsStarting now we officially welcome your to nominate your top products, solutions and standout individuals.