The threat actors behind RedLine and Vidar information stealers have been observed pivoting to ransomware through phishing campaigns that spread initial payloads...
GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning repositories and...
GitHub discovered illegal access to a collection of repositories on December 7, 2022. These repositories were used in the design and development...
Platform certificates, also known as platform keys, are used by OEM Android device makers to certify the core ROM images of their...
Some versions of Java are affected by a critical vulnerability in the Elliptic Curve Digital Signature Algorithm (ECDSA) signature validation that would...
Cybersecurity researchers have disclosed details of an evasive malware campaign that makes use of valid code signing certificates to sneak past security...
A hacking group calling itself Lapsus$ Group claims to have encrypted with ransomware and stolen some 50 TB of information from Brazil’s...
Italian authorities, in collaboration with cybersecurity specialists, reported the dismantling of a cybercriminal group dedicated to a scam related to the preparation...
Authorities in the Indian state of Haryana have announced the arrest of two individuals accused of falsifying hundreds of birth and death...
Law enforcement agencies in the European Union are investigating the theft of a private key used by health authorities to issue and...
Security vulnerabilities are inevitable but one can avoid them by securing applications. In this article, we are listing 5 popular WordPress security...
Researcher Haya Shulman of the Fraunhofer Institute for Secure Information Technology in Germany reported the discovery of a critical vulnerability in Let’s...
During an investigation related to the issuance of a fake death certificate, local authorities in India discovered that the official platforms of...
Venafi has discovered over 100,000 typosquatted domains with legitimate TLS certificates that appear to be aimed at large traders, a company that...
Imperva, one of the leading cyber-security firm disclosed a data breach that impacts the customers’ data of Cloud Web Application Firewall (WAF)....
Experts from multiple digital forensics firms report that the Kazakhstan government has begun intercepting all HTTPS traffic detected within its territory. Internet...
The public in the United States will no longer be able to access several Federal websites due to their expired HTTPS certificates....
Tor is a browser known to keep the IP addresses of its users private and confidential due to which users can surf...
It wasn’t the IP camera software that we thought Recently hackers stole code signature certificates from D-Link and other Taiwan-based manufacturer of...
D-Link and Changing Information Technologies code-signing certificates stolen and abused by highly skilled cyberespionage group focused on East Asia, particularly Taiwan
GetAltName it’s a little script that can extract Subject Alt Names for SSL Certificates directly from HTTPS web sites which can provide...