admin
August 2, 2023
Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat actors,...
admin
August 2, 2023
Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM)...
admin
August 1, 2023
Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equipped to fully take over Facebook...
admin
August 1, 2023
Various European customers of different banks are being targeted by an Android banking trojan called SpyNote as part of...
admin
August 1, 2023
Data Security Posture Management is an approach to securing cloud data by ensuring that sensitive data always...
admin
August 1, 2023
The threat actor known as Space Pirates has been linked to attacks against at least 16 organizations in Russia...
admin
August 1, 2023
A nation-state actor with links to China is suspected of being behind a series of attacks against...
admin
August 1, 2023
Organizations in Italy are the target of a new phishing campaign that leverages a new strain of...
admin
July 31, 2023
Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small...
admin
July 31, 2023
The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible...
admin
July 31, 2023
Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research...
admin
July 31, 2023
More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small...
admin
July 31, 2023
Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users into downloading a...
admin
July 31, 2023
Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could be exploited...
admin
July 29, 2023
Increasing cyber threats and attacks have made protecting organizational data a paramount concern for businesses of all...
admin
July 29, 2023
Apple has announced plans to require developers to submit reasons to use certain APIs in their apps...
admin
July 29, 2023
A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to...
admin
July 29, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a "novel persistent backdoor"...
admin
July 29, 2023
Ivanti has disclosed yet another security flaw impacting Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core,...
admin
July 28, 2023
As part of Checkmarx's mission to help organizations develop and deploy secure software, the Security Research team started looking...