admin
April 10, 2023
As technology advances, cyberattacks are becoming more sophisticated. With the increasing use of technology in our daily...
Estonian National Charged in U.S. for Acquiring Electronics and Metasploit Pro for Russian Military
2 min read
admin
April 10, 2023
An Estonian national has been charged in the U.S. for purchasing U.S.-made electronics on behalf of the Russian government...
admin
April 10, 2023
Threat actors are flooding the npm open source package repository with bogus packages that briefly even resulted...
admin
April 10, 2023
Over one million WordPress websites are estimated to have been infected by an ongoing campaign to deploy...
admin
April 10, 2023
Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration....
admin
April 10, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws to its Known Exploited Vulnerabilities...
admin
April 8, 2023
Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the victim of a cyber...
admin
April 8, 2023
The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the...
admin
April 8, 2023
Apple on Friday released security updates for iOS, iPadOS, macOS, and Safari web browser to address a pair of zero-day flaws...
admin
April 8, 2023
The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address a critical flaw...
admin
April 7, 2023
In yet another sign that Telegram is increasingly becoming a thriving hub for cybercrime, researchers have found that threat...
admin
April 7, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws...
Microsoft Takes Legal Action to Disrupt Cybercriminals’ Illegal Use of Cobalt Strike Tool
2 min read
admin
April 7, 2023
Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle...
admin
April 7, 2023
Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked...
Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation’s Crown Jewels
5 min read
admin
April 6, 2023
Critical infrastructure attacks are a preferred target for cyber criminals. Here's why and what's being done to...
admin
April 6, 2023
A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in...
admin
April 6, 2023
Google is enacting a new data deletion policy for Android apps that allow account creation to also...
admin
April 5, 2023
Portuguese users are being targeted by a new malware codenamed CryptoClippy that's capable of stealing cryptocurrency as part of...
admin
April 5, 2023
An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent...
admin
April 5, 2023
A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think...