admin
November 10, 2023
The notorious Russian hackers known as Sandworm targeted an electrical substation in Ukraine last year, causing a brief power...
admin
November 10, 2023
There is a seemingly never-ending quest to find the right security tools that offer the right capabilities...
admin
November 10, 2023
Cybersecurity researchers have discovered a stealthy backdoor named Effluence that's deployed following the successful exploitation of a recently disclosed...
admin
November 10, 2023
A group with links to Iran targeted transportation, logistics, and technology sectors in the Middle East, including...
admin
November 10, 2023
Urdu-speaking readers of a regional news website that caters to the Gilgit-Baltistan region have likely emerged as...
admin
November 9, 2023
The threat actor known as Lace Tempest has been linked to the exploitation of a zero-day flaw...
New Malvertising Campaign Uses Fake Windows News Portal to Distribute Malicious Installers
3 min read
admin
November 9, 2023
A new malvertising campaign has been found to employ fake sites that masquerade as legitimate Windows news portal to...
admin
November 9, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a high-severity flaw in the Service Location Protocol...
admin
November 9, 2023
While intended for convenience and efficient communication, email auto-forwarding rules can inadvertently lead to the unauthorized dissemination...
admin
November 9, 2023
Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called MuddyC2Go as part of attacks targeting...
admin
November 8, 2023
Cybersecurity researchers have developed what's the first fully undetectable cloud-based cryptocurrency miner leveraging the Microsoft Azure Automation service without...
admin
November 8, 2023
Meta-owned WhatsApp is officially rolling out a new privacy feature in its messaging service called "Protect IP Address in...
admin
November 8, 2023
A new set of malicious Python packages has slithered their way to the Python Package Index (PyPI)...
admin
November 8, 2023
Download the free guide, "It's a Generative AI World: How vCISOs, MSPs and MSSPs Can Keep their...
admin
November 8, 2023
SaaS applications make up 70% of total company software usage, and as businesses increase their reliance on...
admin
November 8, 2023
Cybersecurity researchers have unmasked a prolific threat actor known as farnetwork, who has been linked to five...
admin
November 7, 2023
Numerous industries—including technology, financial services, energy, healthcare, and government—are rushing to incorporate cloud-based and containerized web applications.
The...
admin
November 7, 2023
The North Korea-linked nation-state group called BlueNoroff has been attributed to a previously undocumented macOS malware strain...
admin
November 7, 2023
A new variant of the GootLoader malware called GootBot has been found to facilitate lateral movement on compromised systems...
admin
November 7, 2023
ChatGPT: Productivity tool, great for writing poems, and… a security risk?! In this article, we show how...