admin
September 4, 2023
Cybersecurity researchers have called attention to a new antivirus evasion technique that involves embedding a malicious Microsoft...
admin
September 3, 2023
Proof-of-concept (PoC) exploit code has been made available for a recently disclosed and patched critical flaw impacting...
admin
September 2, 2023
Identity services provider Okta on Friday warned of social engineering attacks orchestrated by threat actors to obtain...
admin
September 1, 2023
Threat actors are exploiting poorly secured Microsoft SQL (MS SQL) servers to deliver Cobalt Strike and a...
admin
September 1, 2023
Cybersecurity and intelligence agencies from Australia, Canada, New Zealand, the U.K., and the U.S. on Thursday disclosed...
admin
September 1, 2023
A new phishing attack likely targeting civil society groups in South Korea has led to the discovery...
admin
September 1, 2023
As cyber threats continue to evolve, adversaries are deploying a range of tools to breach security defenses...
admin
September 1, 2023
The Classiscam scam-as-a-service program has reaped the criminal actors $64.5 million in illicit earnings since its emergence...
admin
August 31, 2023
How often do cyberattacks happen? How frequently do threat actors target businesses and governments around the world?...
admin
August 31, 2023
An open-source .NET-based information stealer malware dubbed SapphireStealer is being used by multiple entities to enhance its capabilities and...
admin
August 31, 2023
Three additional rogue Python packages have been discovered in the Package Index (PyPI) repository as part of...
admin
August 31, 2023
A hacking outfit nicknamed Earth Estries has been attributed to a new, ongoing cyber espionage campaign targeting government and...
admin
August 30, 2023
ChatGPT and similar large language models (LLMs) have added further complexity to the ever-growing online threat landscape....
admin
August 30, 2023
An unknown threat actor is leveraging malicious npm packages to target developers with an aim to steal...
admin
August 30, 2023
New findings show that malicious actors could leverage a sneaky malware detection evasion technique and bypass endpoint...
admin
August 30, 2023
A previously undocumented Android banking trojan dubbed MMRat has been observed targeting mobile users in Southeast Asia since late...
admin
August 30, 2023
Cybersecurity researchers have discovered malicious Android apps for Signal and Telegram distributed via the Google Play Store...
admin
August 30, 2023
Recently disclosed security flaws impacting Juniper firewalls, Openfire, and Apache RocketMQ servers have come under active exploitation...
Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote Attacks

2 min read
admin
August 30, 2023
VMware has released software updates to correct two security vulnerabilities in Aria Operations for Networks that could...
admin
August 30, 2023
A coordinated law enforcement effort codenamed Operation Duck Hunt has felled QakBot, a notorious Windows malware family that's estimated to...