Multi-extortion ransomware relies on stolen data to pressure victims with public leaks. Penta Security explains how its...
Security Aid
A Chinese threat actor exploited the video conferencing platform to perform reconnaissance, escalate privileges, and execute additional...
The vulnerabilities can be chained together to bypass authentication and upload arbitrary files to the server.
The post...
Microsoft is investigating and working to resolve Exchange Online mailbox access issues that have intermittently affected Outlook...
The maintainer of the Axios npm package has confirmed that the supply chain compromise was the result of...
