admin
December 16, 2023
Microsoft is warning of an uptick in malicious activity from an emerging threat cluster it's tracking as Storm-0539 for...
admin
December 15, 2023
Web Application Security consists of a myriad of security controls that ensure that a web application:
Functions as...
admin
December 15, 2023
Multiple security vulnerabilities have been discovered in the open-source Netgate pfSense firewall solution called pfSense that could...
admin
December 15, 2023
A new botnet consisting of firewalls and routers from Cisco, DrayTek, Fortinet, and NETGEAR is being used...
admin
December 15, 2023
Crypto hardware wallet maker Ledger published a new version of its "@ledgerhq/connect-kit" npm module after unidentified threat...
admin
December 15, 2023
A novel multi-platform threat called NKAbuse has been discovered using a decentralized, peer-to-peer network connectivity protocol known as NKN (short for...
admin
December 15, 2023
Google on Thursday announced that it will start testing a new feature called "Tracking Protection" starting January...
admin
December 14, 2023
Network penetration testing plays a crucial role in protecting businesses in the ever-evolving world of cybersecurity. Yet,...
admin
December 14, 2023
Cybersecurity researchers have identified a set of 116 malicious packages on the Python Package Index (PyPI) repository...
admin
December 14, 2023
A pro-Hamas threat actor known as Gaza Cyber Gang is targeting Palestinian entities using an updated version of a...
admin
December 14, 2023
The Iranian state-sponsored threat actor known as OilRig deployed three different downloader malware throughout 2022 to maintain persistent access...
admin
December 14, 2023
Microsoft on Wednesday said it obtained a court order to seize infrastructure set up by a group...
admin
December 14, 2023
Threat actors affiliated with the Russian Foreign Intelligence Service (SVR) have targeted unpatched JetBrains TeamCity servers in...
admin
December 14, 2023
A previously unknown hacker outfit called GambleForce has been attributed to a series of SQL injection attacks against companies...
admin
December 13, 2023
The threat actors behind the BazaCall call back phishing attacks have been observed leveraging Google Forms to lend the...
Google Using Clang Sanitizers to Protect Android Against Cellular Baseband Vulnerabilities
2 min read
admin
December 13, 2023
Google is highlighting the role played by Clang sanitizers in hardening the security of the cellular baseband in the Android...
admin
December 13, 2023
Malware analysis encompasses a broad range of activities, including examining the malware's network traffic. To be effective...
admin
December 13, 2023
Microsoft released its final set of Patch Tuesday updates for 2023, closing out 33 flaws in its software, making...
admin
December 13, 2023
Microsoft has warned that adversaries are using OAuth applications as an automation tool to deploy virtual machines...
admin
December 13, 2023
Ukraine's biggest telecom operator Kyivstar has become the victim of a cyber attack, disrupting customer access to mobile and internet...