admin
February 1, 2023
Two more supply chain security flaws have been disclosed in AMI MegaRAC Baseboard Management Controller (BMC) software,...
admin
January 31, 2023
Do you know where your secrets are? If not, I can tell you: you are not alone.
Hundreds...
admin
January 31, 2023
The Russia-affiliated Sandworm used yet another wiper malware strain dubbed NikoWiper as part of an attack that took place...
admin
January 31, 2023
A shellcode-based packer dubbed TrickGate has been successfully operating without attracting notice for over six years, while enabling threat actors to...
admin
January 31, 2023
Taiwanese company QNAP has released updates to remediate a critical security flaw affecting its network-attached storage (NAS)...
admin
January 31, 2023
GitHub on Monday disclosed that unknown threat actors managed to exfiltrate encrypted code signing certificates pertaining to...
admin
January 30, 2023
A new Golang-based information stealer malware dubbed Titan Stealer is being advertised by threat actors through their Telegram channel.
"The...
admin
January 30, 2023
Researchers are warning about a spike in exploitation attempts weaponizing a critical remote code execution flaw in...
admin
January 29, 2023
The threat actors associated with the Gootkit malware have made "notable changes" to their toolset, adding new...
admin
January 28, 2023
Ukraine has come under a fresh cyber onslaught from Russia that involved the deployment of a previously...
admin
January 28, 2023
Microsoft is urging customers to keep their Exchange servers updated as well as take steps to bolster...
admin
January 28, 2023
The use of software as a service (SaaS) is experiencing rapid growth and shows no signs of...
admin
January 28, 2023
The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet...
admin
January 27, 2023
Cybersecurity researchers have uncovered a PlugX sample that employs sneaky methods to infect attached removable USB media...
admin
January 27, 2023
Cybersecurity researchers have discovered the real-world identity of the threat actor behind Golden Chickens malware-as-a-service, who goes by the...
admin
January 27, 2023
Orcus is a Remote Access Trojan with some distinctive characteristics. The RAT allows attackers to create plugins and...
admin
January 27, 2023
The U.K. National Cyber Security Centre (NCSC) on Thursday warned of spear-phishing attacks mounted by Russian and...
admin
January 26, 2023
The infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as part of a coordinated...
admin
January 26, 2023
Google on Thursday disclosed it took steps to dismantle over 50,000 instances of activity orchestrated by a...
admin
January 26, 2023
Proof-of-concept (Poc) code has been released for a now-patched high-severity security flaw in the Windows CryptoAPI that...