admin
October 9, 2023
"Of course, here's an example of simple code in the Python programming language that can be associated...
admin
October 9, 2023
Multiple high-severity security vulnerabilities have been disclosed in ConnectedIO's ER2000 edge routers and the cloud-based management platform...
admin
October 9, 2023
The maintainers of the Curl library have released an advisory warning of two forthcoming security vulnerabilities that are expected...
admin
October 9, 2023
A Gaza-based threat actor has been linked to a series of cyber attacks aimed at Israeli private-sector...
admin
October 6, 2023
Threat actors have been observed targeting semiconductor companies in East Asia with lures masquerading as Taiwan Semiconductor...
admin
October 6, 2023
As much as $7 billion in cryptocurrency has been illicitly laundered through cross-chain crime, with the North...
admin
October 6, 2023
Ensuring sensitive data remains confidential, protected from unauthorized access, and compliant with data privacy regulations is paramount....
admin
October 6, 2023
GitHub has announced an improvement to its secret scanning feature that extends validity checks to popular services such as...
admin
October 6, 2023
Multiple security vulnerabilities have been disclosed in the Intelligent Platform Management Interface (IPMI) firmware for Supermicro baseboard...
QakBot Threat Actors Still in Action, Using Ransom Knight and Remcos RAT in Latest Attacks

2 min read
admin
October 5, 2023
Despite the disruption to its infrastructure, the threat actors behind the QakBot malware have been linked to...
admin
October 5, 2023
Cisco has released updates to address a critical security flaw impacting Emergency Responder that allows unauthenticated, remote...
Analysis and Config Extraction of Lu0Bot, a Node.js Malware with Considerable Capabilities

5 min read
admin
October 5, 2023
Nowadays, more malware developers are using unconventional programming languages to bypass advanced detection systems. The Node.js malware...
admin
October 5, 2023
A governmental entity in Guyana has been targeted as part of a cyber espionage campaign dubbed Operation Jacana.
The activity,...
admin
October 5, 2023
A new Android banking trojan named GoldDigger has been found targeting several financial applications with an aim...
admin
October 5, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws to its Known Exploited Vulnerabilities...
admin
October 5, 2023
Apple on Wednesday rolled out security patches to address a new zero-day flaw in iOS and iPadOS...
admin
October 5, 2023
Atlassian has released fixes to contain an actively exploited critical zero-day flaw impacting publicly accessible Confluence Data...
admin
October 4, 2023
Today, mid-sized companies and their CISOs are struggling to handle the growing threat of SaaS security with...
admin
October 4, 2023
A new deceptive package hidden within the npm package registry has been uncovered deploying an open-source rootkit...
admin
October 4, 2023
New findings have identified connections between an Android spyware called DragonEgg and another sophisticated modular iOS surveillanceware...