admin
October 1, 2022
Whether you relish a mental challenge or fancy a six-figure paycheck, there are many good reasons to...
admin
October 1, 2022
Microsoft on Friday disclosed that a single activity group in August 2022 achieved initial access and breached...
admin
October 1, 2022
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed critical flaw impacting Atlassian's Bitbucket...
admin
September 30, 2022
An espionage-focused threat actor has been observed using a steganographic trick to conceal a previously undocumented backdoor...
admin
September 30, 2022
Threat actors have been found deploying never-before-seen post-compromise implants in VMware's virtualization software to seize control of...
admin
September 30, 2022
A social engineering campaign leveraging job-themed lures is weaponizing a years-old remote code execution flaw in Microsoft...
admin
September 30, 2022
Endpoint devices like desktops, laptops, and mobile phones enable users to connect to enterprise networks and use...
admin
September 30, 2022
A "highly operational, destructive, and sophisticated nation-state activity group" with ties to North Korea has been weaponizing...
admin
September 30, 2022
Microsoft officially disclosed it investigating two zero-day security vulnerabilities impacting Exchange Server 2013, 2016, and 2019 following reports...
admin
September 30, 2022
Security researchers are warning of previously undisclosed flaws in fully patched Microsoft Exchange servers being exploited by...
admin
September 29, 2022
A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to...
admin
September 29, 2022
Every year, billions of credentials appear online, be it on the dark web, clear web, paste sites,...
admin
September 29, 2022
A Brazilian threat actor known as Prilex has resurfaced after a year-long operational hiatus with an advanced and complex...
admin
September 29, 2022
A threat actor by the name of LeakBase has shared a database containing personal information allegedly affecting...
admin
September 29, 2022
Several hacktivist groups are using Telegram and other tools to aid anti-government protests in Iran to bypass...
admin
September 28, 2022
A new, multi-functional Go-based malware dubbed Chaos has been rapidly growing in volume in recent months to ensnare a...
admin
September 28, 2022
A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote...
admin
September 28, 2022
Organizations struggle to find ways to keep a good security posture. This is because it is difficult...
admin
September 28, 2022
Meta Platforms on Tuesday disclosed it took steps to dismantle two covert influence operations originating from China...
admin
September 28, 2022
The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes...