admin
April 12, 2023
Enterprise communications service provider 3CX confirmed that the supply chain attack targeting its desktop application for Windows and macOS...
Newly Discovered “By-Design” Flaw in Microsoft Azure Could Expose Storage Accounts to Hackers

3 min read
admin
April 11, 2023
A "by-design flaw" uncovered in Microsoft Azure could be exploited by attackers to gain access to storage...
admin
April 11, 2023
Malicious loader programs capable of trojanizing Android applications are being traded on the criminal underground for up...
admin
April 11, 2023
In today's perilous cyber risk landscape, CISOs and CIOs must defend their organizations against relentless cyber threats,...
admin
April 11, 2023
Cybersecurity researchers have detailed the inner workings of the cryptocurrency stealer malware that was distributed via 13...
admin
April 10, 2023
As technology advances, cyberattacks are becoming more sophisticated. With the increasing use of technology in our daily...
Estonian National Charged in U.S. for Acquiring Electronics and Metasploit Pro for Russian Military

2 min read
admin
April 10, 2023
An Estonian national has been charged in the U.S. for purchasing U.S.-made electronics on behalf of the Russian government...
admin
April 10, 2023
Threat actors are flooding the npm open source package repository with bogus packages that briefly even resulted...
admin
April 10, 2023
Over one million WordPress websites are estimated to have been infected by an ongoing campaign to deploy...
admin
April 10, 2023
Today, businesses face a variety of security challenges like cyber attacks, compliance requirements, and endpoint security administration....
admin
April 10, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws to its Known Exploited Vulnerabilities...
admin
April 8, 2023
Taiwanese PC company MSI (short for Micro-Star International) officially confirmed it was the victim of a cyber...
admin
April 8, 2023
The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the...
admin
April 8, 2023
Apple on Friday released security updates for iOS, iPadOS, macOS, and Safari web browser to address a pair of zero-day flaws...
admin
April 8, 2023
The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address a critical flaw...
admin
April 7, 2023
In yet another sign that Telegram is increasingly becoming a thriving hub for cybercrime, researchers have found that threat...
admin
April 7, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws...
Microsoft Takes Legal Action to Disrupt Cybercriminals’ Illegal Use of Cobalt Strike Tool

2 min read
admin
April 7, 2023
Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle...
admin
April 7, 2023
Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked...
Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation’s Crown Jewels

5 min read
admin
April 6, 2023
Critical infrastructure attacks are a preferred target for cyber criminals. Here's why and what's being done to...