admin
October 20, 2023
The U.S. government has announced the seizure of 17 website domains used by North Korean information technology (IT) workers...
admin
October 20, 2023
Due to the rapid evolution of technology, the Internet of Things (IoT) is changing the way business...
admin
October 20, 2023
A new information stealer named ExelaStealer has become the latest entrant to an already crowded landscape filled with various off-the-shelf malware...
admin
October 19, 2023
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12...
admin
October 19, 2023
Google has announced an update to its Play Protect with support for real-time scanning at the code...
admin
October 19, 2023
An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed at over a...
admin
October 19, 2023
The Iran-linked OilRig threat actor targeted an unnamed Middle East government between February and September 2023 as part of...
admin
October 19, 2023
North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity to opportunistically breach...
admin
October 19, 2023
A number of state-back threat actors from Russia and China have been observed exploiting a recent security...
admin
October 18, 2023
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within organizational environments....
admin
October 18, 2023
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks...
admin
October 18, 2023
The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using trojanized versions of Virtual Network...
admin
October 18, 2023
Citrix is warning of exploitation of a recently disclosed critical security flaw in NetScaler ADC and Gateway...
admin
October 18, 2023
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom.
"The...
admin
October 18, 2023
A medium-severity flaw has been discovered in Synology's DiskStation Manager (DSM) that could be exploited to decipher...
admin
October 18, 2023
Taiwanese networking equipment manufacturer D-Link has confirmed a data breach that led to the exposure of what...
admin
October 17, 2023
In what's the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new findings show...
admin
October 17, 2023
Two critical security flaws discovered in the open-source CasaOS personal cloud software could be successfully exploited by attackers to...
admin
October 17, 2023
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors "interfered" with at least...
admin
October 17, 2023
Financial data is much more than just a collection of numbers; it is a crucial component of...