A security report published by an Italian researcher notes that the abuse of a severe vulnerability in the ROG Armory Crate hardware...
State-sponsored hackers affiliated with Russia are behind a new series of intrusions using a previously undocumented implant to compromise systems in the...
A new advanced persistent threat (APT) has been behind a string of attacks against hotels across the world, along with governments, international...
According to researchers, cybercriminals are abusing legitimate challenge and response services like Google’s reCAPTCHA or deploying customized fake CAPTCHA-like validation. Palo Alto...
The security analysts from the cybersecurity firm Bitdefender have recently noted the new backdoor BADHATCH malware that was being used by the...
Researchers from RISKIQ uncovered more than 30 commands & control server infrastructure actively serving malware known as “WellMess/WellMail”. These C2 servers belong...
An advanced persistent threat (APT) actor has been tracked in a new campaign deploying Android malware via the Syrian e-Government Web Portal,...
Lenovo security teams announced the detection of three vulnerabilities affecting the BIOS of approximately 60 models of laptops and notebooks. In its...
WildPressure has been attacking Windows for a long time, that’s why this is not the first time when Windows and macOS operating...
A malicious campaign that has set its sights on industrial-related entities in the Middle East since 2019 has resurfaced with an upgraded...
During a routine investigation, the security analyst of Check Point research has identified a spear-phishing campaign. According to the experts, this campaign...
Recently, in a joint warning, the cybersecurity agencies of the US and UK have released a set of large-scale brute-force attacks escorted...
Cybersecurity researchers are warning of ongoing attacks coordinated by a suspected Chinese-speaking threat actor targeting the Afghanistan government as part of an...
Cybersecurity experts reported the detection of at least four flaws in Dell SupportAsist’s BIOSConnect feature, the exploitation of which would allow threat...
The cybersecurity research team of ESET has recently identified a very new APT group named as BackdoorDiplomacy, attacking telecommunications and diplomatic organizations...
The cybersecurity researchers of the Check Point research team have recently detected that the threat actors of the Chines APT hacking group,...
In the recent era, cyber crimes are happening quite often, and this is not the first time that a cybercriminal group pretending...
A spear-phishing attack operated by a North Korean threat actor targeting its southern counterpart has been found to conceal its malicious code...
As with any other professional activity, in the world of ethical hacking practice makes perfect. Today there are thousands of ethical hackers...
ESET Research has found LuckyMouse, Tick, Winnti Group, and Calypso, among others, are likely using the recent Microsoft Exchange vulnerabilities to compromise...
Swiss Army Knife Proxy for rapid deployments. Supports multiple operations such as request/response dump, filtering and manipulation via DSL language, upstream...