admin
March 9, 2023
Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors...
IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks

2 min read
admin
March 9, 2023
A previously known Windows-based ransomware strain known as IceFire has expanded its focus to target Linux enterprise...
admin
March 9, 2023
Phishing, the theft of users' credentials or sensitive data using social engineering, has been a significant threat...
admin
March 9, 2023
Iranian state-sponsored actors are continuing to engage in social engineering campaigns targeting researchers by impersonating a U.S....
admin
March 9, 2023
The infamous cryptocurrency miner group called 8220 Gang has been observed using a new crypter called ScrubCrypt...
admin
March 9, 2023
Fortinet has released fixes to address 15 security flaws, including one critical vulnerability impacting FortiOS and FortiProxy that...
admin
March 8, 2023
A pair of severe security vulnerabilities have been disclosed in the Jenkins open source automation server that...
admin
March 8, 2023
As threats grow and attack surfaces get more complex, companies continue to struggle with the multitude of...
admin
March 8, 2023
The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business...
admin
March 8, 2023
High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a...
admin
March 8, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited Vulnerabilities (KEV)...
admin
March 7, 2023
Cybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure employees, manufacturing companies,...
admin
March 7, 2023
A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber...
admin
March 7, 2023
Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis,...
admin
March 7, 2023
An older version of Shein's Android application suffered from a bug that periodically captured and transmitted clipboard contents to...
admin
March 7, 2023
The massive breach at LastPass was the result of one of its engineers failing to update Plex...
admin
March 6, 2023
A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America, Europe,...
admin
March 6, 2023
Deep fakes are expected to become a more prominent attack vector. Here's how to identify them.
What are...
admin
March 6, 2023
Law enforcement authorities from Germany and Ukraine have targeted suspected core members of a cybercrime group that...
admin
March 6, 2023
Malicious actors can take advantage of "insufficient" forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive...