admin
March 10, 2023
Multi-factor Authentication (MFA) has long ago become a standard security practice. With a wide consensus on its...
admin
March 10, 2023
A new variant of the Android banking trojan named Xenomorph has surfaced in the wild, the latest...
admin
March 10, 2023
A North Korean espionage group tracked as UNC2970 has been observed employing previously undocumented malware families as part of...
admin
March 9, 2023
Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors...
IceFire Ransomware Exploits IBM Aspera Faspex to Attack Linux-Powered Enterprise Networks
2 min read
admin
March 9, 2023
A previously known Windows-based ransomware strain known as IceFire has expanded its focus to target Linux enterprise...
admin
March 9, 2023
Phishing, the theft of users' credentials or sensitive data using social engineering, has been a significant threat...
admin
March 9, 2023
Iranian state-sponsored actors are continuing to engage in social engineering campaigns targeting researchers by impersonating a U.S....
admin
March 9, 2023
The infamous cryptocurrency miner group called 8220 Gang has been observed using a new crypter called ScrubCrypt...
admin
March 9, 2023
Fortinet has released fixes to address 15 security flaws, including one critical vulnerability impacting FortiOS and FortiProxy that...
admin
March 8, 2023
A pair of severe security vulnerabilities have been disclosed in the Jenkins open source automation server that...
admin
March 8, 2023
As threats grow and attack surfaces get more complex, companies continue to struggle with the multitude of...
admin
March 8, 2023
The North Korea-linked Lazarus Group has been observed weaponizing flaws in an undisclosed software to breach a financial business...
admin
March 8, 2023
High-profile government entities in Southeast Asia are the target of a cyber espionage campaign undertaken by a...
admin
March 8, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three security flaws to its Known Exploited Vulnerabilities (KEV)...
admin
March 7, 2023
Cybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure employees, manufacturing companies,...
admin
March 7, 2023
A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber...
admin
March 7, 2023
Investing in digital identity can improve security, increase clinical productivity, and boost healthcare's bottom line. — by Gus Malezis,...
admin
March 7, 2023
An older version of Shein's Android application suffered from a bug that periodically captured and transmitted clipboard contents to...
admin
March 7, 2023
The massive breach at LastPass was the result of one of its engineers failing to update Plex...
admin
March 6, 2023
A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America, Europe,...
