admin
February 3, 2024
Remote desktop software maker AnyDesk disclosed on Friday that it suffered a cyber attack that led to...
admin
February 2, 2024
Russian state-sponsored actors have staged NT LAN Manager (NTLM) v2 hash relay attacks through various methods from...
admin
February 2, 2024
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned that more than 2,000 computers in the...
admin
February 2, 2024
A former software engineer with the U.S. Central Intelligence Agency (CIA) has been sentenced to 40 years...
admin
February 2, 2024
Cloudzy, a prominent cloud infrastructure provider, proudly announces a significant enhancement in its cybersecurity landscape. This breakthrough...
admin
February 2, 2024
An INTERPOL-led collaborative operation targeting phishing, banking malware, and ransomware attacks has led to the identification of...
admin
February 2, 2024
Cloudflare has revealed that it was the target of a likely nation-state attack in which the threat...
admin
February 1, 2024
The threat actor behind a peer-to-peer (P2P) botnet known as FritzFrog has made a return with a new variant...
admin
February 1, 2024
Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking campaign called Commando Cat.
"The...
admin
February 1, 2024
Cybersecurity researchers have detailed an updated version of the malware HeadCrab that's known to target Redis database servers across...
admin
February 1, 2024
How’s your vulnerability management program doing? Is it effective? A success? Let’s be honest, without the right...
admin
February 1, 2024
Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221...
admin
February 1, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw impacting iOS, iPadOS, macOS, tvOS,...
admin
January 31, 2024
Multiple security vulnerabilities have been disclosed in the runC command line tool that could be exploited by...
admin
January 31, 2024
Ivanti is alerting of two new high-severity flaws in its Connect Secure and Policy Secure products, one...
admin
January 31, 2024
Cybersecurity researchers are calling attention to the "democratization" of the phishing ecosystem owing to the emergence of...
admin
January 31, 2024
Malicious local attackers can obtain full root access on Linux machines by taking advantage of a newly...
admin
January 31, 2024
A financially motivated threat actor known as UNC4990 is leveraging weaponized USB devices as an initial infection vector to...
admin
January 31, 2024
The SEC isn’t giving SaaS a free pass. Applicable public companies, known as “registrants,” are now subject...
admin
January 31, 2024
A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual private network (VPN) devices...