Technology ❯Cybersecurity ❯Malware
Developer Tools Unauthorized Access Data Breaches Third-Party Plugins Phishing-as-a-Service Cleo File-sharing Software LNK Files Cobalt Strike User Safety Denial of Service Microsoft Office SploitLight Zero-Day Vulnerabilities
They close a critical WebKit flaw discovered by Google TAG under a CISA order requiring federal agencies to patch by August 12.