admin
October 18, 2022
HelpSystems, the company behind the Cobalt Strike software platform, has released an out-of-band security update to address...
admin
October 17, 2022
New research has disclosed what's being called a security vulnerability in Microsoft 365 that could be exploited...
admin
October 17, 2022
Don’t let the ongoing “crypto winter” lull you into a false sense of cybersecurity. Even as cryptocurrencies lose...
admin
October 17, 2022
A new ransomware campaign targeted the transportation and logistics sectors in Ukraine and Poland on October 11...
admin
October 17, 2022
The threat actors behind the Black Basta ransomware family have been observed using the Qakbot trojan to deploy the Brute...
admin
October 17, 2022
Zimbra has released patches to contain an actively exploited security flaw in its enterprise collaboration suite that could be...
admin
October 17, 2022
The International Criminal Police Organization, also called the Interpol, has announced the arrests of 75 individuals as...
admin
October 15, 2022
Tata Power Company Limited, India's largest integrated power company, on Friday confirmed it was targeted by a...
admin
October 15, 2022
Details have emerged about a now-patched security flaw in Windows Common Log File System (CLFS) that could...
admin
October 14, 2022
A PHP version of an information-stealing malware called Ducktail has been discovered in the wild being distributed in the...
admin
October 14, 2022
With each passing year, the cybersecurity threat landscape continues to worsen. That reality makes cybersecurity analysts some...
admin
October 14, 2022
Telecommunications and IT service providers in the Middle East and Asia are being targeted by a previously...
admin
October 14, 2022
Web infrastructure and security company Cloudflare disclosed this week that it halted a 2.5 Tbps distributed denial-of-service...
admin
October 14, 2022
A proof-of-concept (PoC) exploit code has been made available for the recently disclosed critical security flaw affecting...
admin
October 13, 2022
A novel timing attack discovered against the npm's registry API can be exploited to potentially disclose private...
admin
October 13, 2022
What is the OWASP Top 10, and – just as important – what is it not? In...
admin
October 13, 2022
A previously undocumented command-and-control (C2) framework dubbed Alchimist is likely being used in the wild to target...
admin
October 13, 2022
An advanced persistent threat (APT) actor known as Budworm targeted a U.S.-based entity for the first time in more...
admin
October 13, 2022
An unofficial version of the popular WhatsApp messaging app called YoWhatsApp has been observed deploying an Android...
admin
October 13, 2022
A threat actor tracked as Polonium has been linked to over a dozen highly targeted attacks aimed...