admin
October 18, 2023
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within organizational environments....
admin
October 18, 2023
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks...
admin
October 18, 2023
The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using trojanized versions of Virtual Network...
admin
October 18, 2023
Citrix is warning of exploitation of a recently disclosed critical security flaw in NetScaler ADC and Gateway...
admin
October 18, 2023
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom.
"The...
admin
October 18, 2023
A medium-severity flaw has been discovered in Synology's DiskStation Manager (DSM) that could be exploited to decipher...
admin
October 18, 2023
Taiwanese networking equipment manufacturer D-Link has confirmed a data breach that led to the exposure of what...
admin
October 17, 2023
In what's the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new findings show...
admin
October 17, 2023
Two critical security flaws discovered in the open-source CasaOS personal cloud software could be successfully exploited by attackers to...
admin
October 17, 2023
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors "interfered" with at least...
admin
October 17, 2023
Financial data is much more than just a collection of numbers; it is a crucial component of...
admin
October 17, 2023
Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise of malicious...
admin
October 17, 2023
A severity flaw impacting industrial cellular routers from Milesight may have been actively exploited in real-world attacks,...
admin
October 17, 2023
Cisco has warned of a critical, unpatched security flaw impacting IOS XE software that’s under active exploitation...
admin
October 16, 2023
SaaS Security’s roots are in configuration management. An astounding 35% of all security breaches begin with security...
admin
October 16, 2023
Pro-Russian hacking groups have exploited a recently disclosed security vulnerability in the WinRAR archiving utility as part...
admin
October 16, 2023
The Android banking trojan known as SpyNote has been dissected to reveal its diverse information-gathering features.
Typically spread via SMS...
admin
October 16, 2023
Encrypted messaging app Signal has pushed back against "viral reports" of an alleged zero-day flaw in its...
admin
October 16, 2023
Threat actors have been observed serving malicious code by utilizing Binance's Smart Chain (BSC) contracts in what...
admin
October 14, 2023
Microsoft has announced that it plans to eliminate NT LAN Manager (NTLM) in Windows 11 in the future, as...