admin
April 10, 2023
Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration....
admin
April 10, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws to its Known Exploited Vulnerabilities...
admin
April 8, 2023
Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the victim of a cyber...
admin
April 8, 2023
The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the...
admin
April 8, 2023
Apple on Friday released security updates for iOS, iPadOS, macOS, and Safari web browser to address a pair of zero-day flaws...
admin
April 8, 2023
The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address a critical flaw...
admin
April 7, 2023
In yet another sign that Telegram is increasingly becoming a thriving hub for cybercrime, researchers have found that threat...
admin
April 7, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws...
Microsoft Takes Legal Action to Disrupt Cybercriminals’ Illegal Use of Cobalt Strike Tool

2 min read
admin
April 7, 2023
Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle...
admin
April 7, 2023
Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked...
Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation’s Crown Jewels

5 min read
admin
April 6, 2023
Critical infrastructure attacks are a preferred target for cyber criminals. Here's why and what's being done to...
admin
April 6, 2023
A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in...
admin
April 6, 2023
Google is enacting a new data deletion policy for Android apps that allow account creation to also...
admin
April 5, 2023
Portuguese users are being targeted by a new malware codenamed CryptoClippy that's capable of stealing cryptocurrency as part of...
admin
April 5, 2023
An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent...
admin
April 5, 2023
A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think...
admin
April 5, 2023
Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the...
admin
April 5, 2023
The threat actor behind the information-stealing malware known as Typhon Reborn has resurfaced with an updated version (V2) that...
admin
April 4, 2023
Clouded vision
CTI systems are confronted with some major issues ranging from the size of the collection networks...
admin
April 4, 2023
Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that's both sophisticated and fast.
"What...