A weakness in Google's OAuth "Sign in with Google" feature could enable attackers that register domains of defunct startups ...
Attackers are exploiting a new authentication bypass zero-day vulnerability in FortiOS and FortiProxy to hijack Fortinet ...
Threat actors are utilizing the FastHTTP Go library to launch high-speed brute-force password attacks targeting Microsoft 365 ...
Path of Exile 2 developers confirmed that a hacked admin account allowed a threat actor to change the password and access at ...
CISA tagged a vulnerability in BeyondTrust's Privileged Remote Access (PRA) and Remote Support (RS) as actively exploited in ...
Nominet, the official .UK domain registry and one of the largest country code registries, has confirmed that its network was ...
Blood-donation not-for-profit OneBlood confirms that donors' personal information was stolen in a ransomware attack last summer.
Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install ...
Threat actors are exploiting a critical remote command execution vulnerability, tracked as CVE-2024-50603, in Aviatrix ...
Microsoft is investigating an ongoing Multi-Factor Authentication (MFA) outage that is blocking customers from accessing ...
A new ransomware campaign encrypts Amazon S3 buckets using AWS's Server-Side Encryption with Customer Provided Keys (SSE-C) ...
Cybercriminals are exploiting a trick to turn off Apple iMessage's built-in phishing protection for a text and trick users ...