Critical Flaw in NextGen’s Mirth Connect Could Expose Healthcare Data
Oct 26, 2023NewsroomVulnerability / Network Security Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare, are being...
Oct 26, 2023NewsroomVulnerability / Network Security Users of Mirth Connect, an open-source data integration platform from NextGen HealthCare, are being...
Oct 23, 2023NewsroomCyberattack / Malware The open-source remote access trojan known as Quasar RAT has been observed leveraging DLL side-loading...
Oct 17, 2023NewsroomVulnerability / Cyber Threat Two critical security flaws discovered in the open-source CasaOS personal cloud software could be...
International life sciences and healthcare platform provider, Vitrana, has significantly decreased open-source software (OSS) security vulnerabilities by over 66% with...
The chief executive of RISC-V International said that possible government restrictions on the open-source technology will slow down the development...
Published in: ...
Oct 02, 2023THNVulnerability / Cyber Attack A high-severity security flaw has been disclosed in the open-source OpenRefine data cleanup and...
3. TensorFlow Developed by Google as an open-source machine learning framework, TensorFlow is most used to build and train machine...
The Microsoft leak, which stemmed from AI researchers sharing open-source training data on GitHub, has been mitigated. Microsoft has patched...
Talos wars of customizations of the open-source info stealer SapphireStealer Pierluigi Paganini September 01, 2023 Cisco reported that multiple threat...
Aug 31, 2023THNMalware / Cyber Threat An open-source .NET-based information stealer malware dubbed SapphireStealer is being used by multiple entities...
Open-source content management system (CMS) provider, Umbraco, has announced a new Eastern Australian regional hosting option for Umbraco Cloud customers....
The XDR Alliance has announced the release of a new set of open-source API specifications that help leading cybersecurity vendors...
Researchers observed threat actors that are using an open-source rootkit called Reptile in attacks aimed at systems in South Korea. Reptile is...
Aug 05, 2023THNLinux / Malware Threat actors are using an open-source rootkit called Reptile to target Linux systems in South...