admin
August 4, 2023
A married couple from New York City has pleaded guilty to money laundering charges in connection with...
admin
August 4, 2023
Privileged Access Management (PAM) solutions are widely acknowledged as the gold standard for securing critical privileged accounts....
admin
August 4, 2023
Cybersecurity researchers have discovered a new bunch of malicious packages on the npm package registry that are...
admin
August 4, 2023
A four-year-old critical security flaw impacting Fortinet FortiOS SSL has emerged as one of the most routinely...
admin
August 3, 2023
Threat actors are leveraging a technique called versioning to evade Google Play Store's malware detections and target...
admin
August 3, 2023
Microsoft is warning of the threat malicious cyber actors pose to stadium operations, warning that the cyber...
admin
August 3, 2023
A hacktivist group known as Mysterious Team Bangladesh has been linked to over 750 distributed denial-of-service (DDoS) attacks and...
admin
August 3, 2023
Microsoft on Wednesday disclosed that it identified a set of highly targeted social engineering attacks mounted by...
admin
August 3, 2023
Cybersecurity researchers have discovered a bypass for a recently fixed actively exploited vulnerability in some versions of...
admin
August 2, 2023
In recent years the rise of illicit activities conducted within online messaging platforms has become a growing...
admin
August 2, 2023
Cybersecurity researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows the AWS...
admin
August 2, 2023
A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group is actively modifying...
admin
August 2, 2023
A sophisticated Facebook phishing campaign has been observed exploiting a zero-day flaw in Salesforce's email services, allowing...
admin
August 2, 2023
About 34% of security vulnerabilities impacting industrial control systems (ICSs) that were reported in the first half...
admin
August 2, 2023
Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat actors,...
admin
August 2, 2023
Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM)...
admin
August 1, 2023
Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equipped to fully take over Facebook...
admin
August 1, 2023
Various European customers of different banks are being targeted by an Android banking trojan called SpyNote as part of...
admin
August 1, 2023
Data Security Posture Management is an approach to securing cloud data by ensuring that sensitive data always...
admin
August 1, 2023
The threat actor known as Space Pirates has been linked to attacks against at least 16 organizations in Russia...