Cryptominers Snuck Logic Bomb Into Python Packages

Malware can show up where you least expect it. Researchers discovered a logic bomb attack…

What’s Behind the Leaks of Customer Data From Retailer Databases?

Retail data breaches involving customer data happen often today. However, they tend to be smaller…

Fighting Cyber Threats With Open-Source Tools and Open Standards

Detecting cyber threats is usually the first critical step in the mitigation of cyber attacks.…

Dissecting Sodinokibi Ransomware Attacks: Bringing Incident Response and Intelligence Together in the Fight

Ransomware actors are specializing, collaborating and assisting each other to conduct sophisticated attacks that are…

How to Protect Yourself From a Server-Side Template Injection Attack

Server-side templates provide an easy method of managing the dynamic generation of HTML code. But…

[FortiProxy] file leaking through SSL VPN language resource request

A path traversal vulnerability in the FortiProxy SSL VPN web portal may allow a non-authenticated,…