admin
October 19, 2023
The Iran-linked OilRig threat actor targeted an unnamed Middle East government between February and September 2023 as part of...
admin
October 19, 2023
North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity to opportunistically breach...
admin
October 19, 2023
A number of state-back threat actors from Russia and China have been observed exploiting a recent security...
admin
October 18, 2023
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within organizational environments....
admin
October 18, 2023
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks...
admin
October 18, 2023
The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using trojanized versions of Virtual Network...
admin
October 18, 2023
Citrix is warning of exploitation of a recently disclosed critical security flaw in NetScaler ADC and Gateway...
admin
October 18, 2023
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom.
"The...
admin
October 18, 2023
A medium-severity flaw has been discovered in Synology's DiskStation Manager (DSM) that could be exploited to decipher...
admin
October 18, 2023
Taiwanese networking equipment manufacturer D-Link has confirmed a data breach that led to the exposure of what...
admin
October 17, 2023
In what's the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new findings show...
admin
October 17, 2023
Two critical security flaws discovered in the open-source CasaOS personal cloud software could be successfully exploited by attackers to...
admin
October 17, 2023
The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors "interfered" with at least...
admin
October 17, 2023
Financial data is much more than just a collection of numbers; it is a crucial component of...
admin
October 17, 2023
Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise of malicious...
admin
October 17, 2023
A severity flaw impacting industrial cellular routers from Milesight may have been actively exploited in real-world attacks,...
admin
October 17, 2023
Cisco has warned of a critical, unpatched security flaw impacting IOS XE software that’s under active exploitation...
admin
October 16, 2023
SaaS Security’s roots are in configuration management. An astounding 35% of all security breaches begin with security...
admin
October 16, 2023
Pro-Russian hacking groups have exploited a recently disclosed security vulnerability in the WinRAR archiving utility as part...
admin
October 16, 2023
The Android banking trojan known as SpyNote has been dissected to reveal its diverse information-gathering features.
Typically spread via SMS...