admin
March 31, 2023
Organizations rely on Incident response to ensure they are immediately aware of security incidents, allowing for quick action to...
admin
March 31, 2023
The advanced persistent threat (APT) actor known as Winter Vivern is now targeting officials in Europe and...
admin
March 31, 2023
The Cyber Police of Ukraine, in collaboration with law enforcement officials from Czechia, has arrested several members...
admin
March 31, 2023
Enterprise communications software maker 3CX on Thursday confirmed that multiple versions of its desktop app for Windows...
admin
March 30, 2023
Details have emerged about a now-patched vulnerability in Azure Service Fabric Explorer (SFX) that could lead to...
admin
March 30, 2023
A Chinese state-sponsored threat activity group tracked as RedGolf has been attributed to the use of a custom Windows and Linux...
admin
March 30, 2023
A group of academics from Northeastern University and KU Leuven has disclosed a fundamental design flaw in...
admin
March 30, 2023
Multi-cloud data storage, once merely a byproduct of the great cloud migration, has now become a strategy...
AlienFox Malware Targets API Keys and Secrets from AWS, Google, and Microsoft Cloud Services

2 min read
admin
March 30, 2023
A new "comprehensive toolset" called AlienFox is being distributed on Telegram as a way for threat actors to harvest...
admin
March 30, 2023
3CX said it's working on a software update for its desktop app after multiple cybersecurity vendors sounded the alarm...
admin
March 29, 2023
Malware analysis is an essential part of security researcher's work. But working with malicious samples can be...
admin
March 29, 2023
The emergence of smart mobility services and applications has led to a sharp increase in the use...
admin
March 29, 2023
A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to...
admin
March 29, 2023
An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at...
admin
March 29, 2023
A new North Korean nation-state cyber operator has been attributed to a series of campaigns orchestrated to...
admin
March 29, 2023
Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern...
admin
March 28, 2023
Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an attempt to...
admin
March 28, 2023
Malicious actors are constantly adapting their tactics, techniques, and procedures (TTPs) to adapt to political, technological, and...
admin
March 28, 2023
An advanced persistent threat (APT) group that has a track record of targeting India and Afghanistan has...
admin
March 28, 2023
Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more...