admin
December 8, 2022
Looking to up your cybersecurity game in the new year? Do not just buy electronics this vacation...
admin
December 8, 2022
An Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor to target South...
admin
December 8, 2022
An Iranian advanced persistent threat (APT) actor known as Agrius has been attributed as behind a set of data...
admin
December 7, 2022
A state-sponsored hacking group with links to Russia has been linked to attack infrastructure that spoofs the...
admin
December 7, 2022
The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and...
admin
December 7, 2022
Critical infrastructure is important for societal existence, growth, and development. Societies are reliant on the services provided...
admin
December 7, 2022
The China-linked nation-state hacking group referred to as Mustang Panda is using lures related to the ongoing Russo-Ukrainian War...
admin
December 7, 2022
Cryptocurrency investment companies are the target of a developing threat cluster that uses Telegram groups to seek...
New Go-based Zerobot Botnet Exploiting Dozen of IoT Vulnerabilities to Expand its Network

2 min read
admin
December 7, 2022
A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two...
admin
December 6, 2022
A malicious campaign targeting the Middle East is likely linked to BackdoorDiplomacy, an advanced persistent threat (APT) group...
admin
December 6, 2022
Hackers with ties to the Iranian government have been linked to an ongoing social engineering and credential...
admin
December 6, 2022
Cybersecurity researchers have shed light on a darknet marketplace called InTheBox that's designed to specifically cater to mobile malware...
admin
December 6, 2022
Ransomware attacks keep increasing in volume and impact largely due to organizations' weak security controls. Mid-market companies...
admin
December 6, 2022
A persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies at...
admin
December 6, 2022
A version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities...
admin
December 5, 2022
In the era of digitization and ever-changing business needs, the production environment has become a living organism....
admin
December 5, 2022
Three different security flaws have been disclosed in American Megatrends (AMI) MegaRAC Baseboard Management Controller (BMC) software that...
admin
December 5, 2022
A new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor's offices and courts.
"Although...
admin
December 5, 2022
Cybersecurity researchers have discovered a security vulnerability that exposes cars from Honda, Nissan, Infiniti, and Acura to...
admin
December 5, 2022
The Lazarus Group threat actor has been observed leveraging fake cryptocurrency apps as a lure to deliver...