admin
April 18, 2024
The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign targeting the U.S....
admin
April 18, 2024
Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and...
admin
April 18, 2024
Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack
Zerto, a Hewlett Packard...
admin
April 18, 2024
Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual...
admin
April 18, 2024
A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by leveraging...
admin
April 18, 2024
As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime...
admin
April 18, 2024
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software...
admin
April 17, 2024
A previously undocumented "flexible" backdoor called Kapeka has been "sporadically" observed in cyber attacks targeting Eastern Europe, including Estonia...
admin
April 17, 2024
The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a...
admin
April 17, 2024
Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber (aka C3RB3R) ransomware.
The...
admin
April 17, 2024
Cybersecurity researchers have discovered a new campaign that's exploiting a recently disclosed security flaw in Fortinet FortiClient...
admin
April 17, 2024
Cisco is warning about a global surge in brute-force attacks targeting various devices, including Virtual Private Network...
admin
April 16, 2024
Security researchers have uncovered a "credible" takeover attempt targeting the OpenJS Foundation in a manner that evokes...
admin
April 16, 2024
The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation technique to deliver a wide...
admin
April 16, 2024
New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services (AWS) and Google...
admin
April 16, 2024
The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users of a critical vulnerability impacting...
admin
April 16, 2024
In today's rapidly evolving digital landscape, organizations face an increasingly complex array of cybersecurity threats. The proliferation...
admin
April 16, 2024
The U.S. Federal Trade Commission (FTC) has ordered the mental telehealth company Cerebral from using or disclosing...
admin
April 16, 2024
Two individuals have been arrested in Australia and the U.S. in connection with an alleged scheme to...
admin
April 15, 2024
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs) has remained unpatched...