admin
November 21, 2022
As IT professionals, we all reach a certain point in our IT career where we realize that...
Google Identifies 34 Cracked Versions of Popular Cobalt Strike Hacking Toolkit in the Wild

2 min read
admin
November 21, 2022
Google Cloud last week disclosed that it identified 34 different hacked release versions of the Cobalt Strike...
admin
November 21, 2022
Google has won a lawsuit filed against two Russian nationals in connection with the operation of a...
admin
November 19, 2022
The Indian government on Friday released a draft version of the much-awaited data protection regulation, making it...
admin
November 19, 2022
A notorious advanced persistent threat actor known as Mustang Panda has been linked to a spate of spear-phishing attacks...
admin
November 19, 2022
A developing threat activity cluster has been found using Google Ads in one of its campaigns to...
admin
November 19, 2022
Australian software company Atlassian has rolled out security updates to address two critical flaws affecting Bitbucket Server, Data Center,...
Meta Reportedly Fires Dozens of Employees for Hijacking Users’ Facebook and Instagram Accounts

2 min read
admin
November 18, 2022
Meta Platforms is said to have fired or disciplined over two dozen employees and contractors over the...
admin
November 18, 2022
The LodaRAT malware has resurfaced with new variants that are being deployed in conjunction with other sophisticated...
admin
November 18, 2022
Threat hunting is the process of looking for malicious activity and its artifacts in a computer system...
admin
November 18, 2022
The threat actors behind the Hive ransomware-as-a-service (RaaS) scheme have launched attacks against over 1,300 companies across...
admin
November 18, 2022
An ongoing supply chain attack has been leveraging malicious Python packages to distribute malware called W4SP Stealer,...
admin
November 17, 2022
A China-based financially motivated group is leveraging the trust associated with popular international brands to orchestrate a...
admin
November 17, 2022
Hackers tied to the North Korean government have been observed using an updated version of a backdoor...
admin
November 17, 2022
A Ukrainian national who has been wanted by the U.S for over a decade has been arrested...
admin
November 17, 2022
On average, organizations report using 102 business-critical SaaS applications, enabling operations of most departments across an organization, such as...
admin
November 17, 2022
Multiple security vulnerabilities have been disclosed in F5 BIG-IP and BIG-IQ devices that, if successfully exploited, to...
admin
November 17, 2022
Iranian government-sponsored threat actors have been blamed for compromising a U.S. federal agency by taking advantage of...
admin
November 16, 2022
Hundreds of databases on Amazon Relational Database Service (Amazon RDS) are exposing personal identifiable information (PII), new...
admin
November 16, 2022
According to a recent survey, 90% of CISOs running teams in small to medium-sized enterprises (SMEs) use a...