admin
August 11, 2023
A set of 15 high-severity security flaws have been disclosed in the CODESYS V3 software development kit (SDK) that...
admin
August 11, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched security flaw in Microsoft's .NET and...
admin
August 10, 2023
Malicious actors are using a legitimate Rust-based injector called Freeze[.]rs to deploy a commodity malware called XWorm in victim...
admin
August 10, 2023
A new information malware strain called Statc Stealer has been found infecting devices running Microsoft Windows to siphon sensitive...
admin
August 10, 2023
Attackers continue to target Microsoft identities to gain access to connected Microsoft applications and federated SaaS applications....
admin
August 10, 2023
A widely used Chinese language input app for Windows and Android has been found vulnerable to serious...
admin
August 10, 2023
Threat actors are increasingly using a phishing-as-a-service (PhaaS) toolkit dubbed EvilProxy to pull off account takeover attacks...
admin
August 10, 2023
Interpol has announced the takedown of a phishing-as-a-service (PhaaS) platform called 16Shop, in addition to the arrests...
admin
August 9, 2023
Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak...
admin
August 9, 2023
Hackers associated with China's Ministry of State Security (MSS) have been linked to attacks in 17 different...
admin
August 9, 2023
Validate security continuously across your full stack with Pen Testing as a Service.
In today's modern security operations...
admin
August 9, 2023
Google has introduced a new security feature in Android 14 that allows IT administrators to disable support...
admin
August 9, 2023
The U.K. Electoral Commission on Tuesday disclosed a "complex" cyber attack on its systems that went undetected...
admin
August 9, 2023
Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tuesday updates...
admin
August 8, 2023
The operators associated with the QakBot (aka QBot) malware have set up 15 new command-and-control (C2) servers...
admin
August 8, 2023
New research has revealed that threat actors are abusing Cloudflare Tunnels to establish covert communication channels from...
admin
August 8, 2023
Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks,...
admin
August 8, 2023
An unknown threat actor is using a variant of the Yashma ransomware to target various entities in...
LOLBAS in the Wild: 11 Living-Off-The-Land Binaries That Could Be Used for Malicious Purposes

2 min read
admin
August 8, 2023
Cybersecurity researchers have discovered a set of 11 living-off-the-land binaries-and-scripts (LOLBAS) that could be maliciously abused by...
admin
August 7, 2023
A new malware campaign has been observed making use of malicious OpenBullet configuration files to target inexperienced...