Have I Been Pwned has added almost 71 million email addresses associated with stolen accounts in the Naz.API dataset to its data breach notification service.
0Microsoft says that a group of Iranian-backed state hackers are targeting high-profile employees of research organizations and universities across Europe and the United States in spearphishing attacks pushing new backdoor malware.
0Learn how to automate Windows with this Microsoft PowerShell Certification Bundle, on sale for just $29.99 (reg. $60) for a limited time.
0A previously unknown cybercrime syndicate named 'Bigpanzi' has been making significant money by infecting Android TV and eCos set-top boxes worldwide since at least 2015.
0Today, CISA ordered U.S. federal agencies to secure their systems against three recently patched Citrix NetScaler and Google Chrome zero-days actively exploited in attacks.
0Security researchers found that infections with high-profile spyware Pegasus, Reign, and Predator could be discovered on compromised Apple mobile devices by checking Shutdown.log, a system log file that stores reboot events.
0A new vulnerability dubbed 'LeftoverLocals' affecting graphics processing units from AMD, Apple, Qualcomm, and Imagination Technologies allows retrieving data from the local memory space.
1Open source solutions allow organizations to customize and adapt their cybersecurity infrastructure to their specific needs. Learn more from @wazuh on building open source cybersecurity infrastructure.
0Learning a new language helps turbocharge your career, keeps your mind sharp, and makes reaching your other personal goals easier. A Rosetta Stone lifetime subscription can keep you on track for your language goals for $149.97, $250 off the $400 MSRP with code ROSETTA at checkout, but only through the end of January 21st.
0GitHub rotated keys potentially exposed by a vulnerability patched in December that could let attackers access credentials within production containers via environment variables.
0Multiple information stealers for the macOS platform have demonstrated the capability to evade detection even when security companies follow and report about new variants frequently.
1Citrix urged customers on Tuesday to immediately patch Netscaler ADC and Gateway appliances exposed online against two actively exploited zero-day vulnerabilities.
0Google has released security updates to fix the first Chrome zero-day vulnerability exploited in the wild since the start of the year.
1No matter what your role, you need to understand how cybersecurity works at a deep level. This course of NIST's risk management frameworks explains that function for $39.99, $120 off the $160 MSRP.
0The Calvià City Council in Majorca announced it was targeted by a ransomware attack on Saturday, which impacted municipal services.
0CISA and the FBI warned today that threat actors using Androxgh0st malware are building a botnet focused on cloud credential theft and using the stolen information to deliver additional malicious payloads.
0A set of nine vulnerabilities, collectively called 'PixieFail,' impact the IPv6 network protocol stack of Tianocore's EDK II, the open-source reference implementation of the UEFI specification widely used in enterprise computers and servers.
0Atlassian Confluence Data Center and Confluence Server are vulnerable to a critical remote code execution (RCE) vulnerability that impacts versions released before December 5, 2023, including out-of-support releases.
0AI presents significant advantages for organizations, but it's also being exploited to amplify and intensify cyberattacks. Learn more from Outpost24 about how hackers are harnessing the power of AI.
0Get this certified refurbished Lenovo ThinkCentre M900 Core i5-6500T desktop in black for $179.97 (reg. $349).
3