Ransomware affiliates for the LockBit 3.0 gang are ramping up their assault on the so-called "Citrix Bleed" security vulnerability, resulting in re-upped warnings from...
A fresh proof-of-concept (PoC) exploit for a critical security vulnerability in Apache ActiveMQ is making it easier than ever to achieve remote code execution...
At least four separate cyberattack groups have used a former zero-day security vulnerability in the Zimbra Collaboration Suite (ZCS) to steal email data, user...
Aave pauses services after identifying security vulnerability concerning fixed-rate borrowingThe community for Aave, the leading DeFi lending protocol, will soon start voting on a...
An exploit for the recently disclosed "Looney Tunables" security vulnerability, which could allow cyberattackers to gain root privileges on millions of Linux systems, is...
Lawyer and cryptocurrency supporter John Deaton has criticized the Lightning Network, deeming it less effective than the “Spend The Bits” protocol on the XRP...
An Internet-wide security vulnerability is at the root of a zero-day attack dubbed "HTTP/2 Rapid Reset," which resulted in a distributed denial-of-service (DDoS) flood...
Now that the SEC wants to know about any material security incidents within four days of determination, CISOs must determine what constitutes a material...
Transferred Funds By Hackers Are Estimated At $4.8 Million
On September 11, the hacker first transferred 520,000 MATIC tokens, worth over $266,000, which were bridged...