The Iran-linked MuddyWater threat actor has been observed targeting several countries in the Middle East as well as Central and West Asia...
Web application firewalls, also known as WAFs, are intended to protect web-based applications and application programming interfaces (APIs) from malicious HTTPS traffic...
daloRADIUS is a sophisticated RADIUS web management tool that has been created with the goal of managing hotspots and ISP installations for...
According to a joint Cybersecurity Advisory (CSA) from the FBI, CISA, and MS-ISAC published in September 2022, Vice Society actors have recently...
An Internet Explorer zero-day vulnerability was actively exploited by a North Korean threat actor to target South Korean users by capitalizing on...
FortiGuard Labs discovered a one-of-a-kind botnet in November that was created in the Go programming language and was being spread via vulnerabilities...
A new zero-day vulnerability has been found by Google’s Threat Analysis Group (TAG), and it is being actively exploited by hackers who...
The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and surpassing other ransomware families like...
CryWiper, a previously unknown data wiper that masquerades as ransomware, has been recently discovered and is spreading around the internet. Furthermore, this...
Research carried out by security analysts at CRIL (Cyble Research and Intelligence Labs) recently identified several ransomware groups that are actively targeting...
A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security vulnerabilities...
Customers have been alerted by Sophos that many vulnerabilities, including ones that may lead to arbitrary code execution, have been patched in...
Rackspace, a provider of cloud computing services, has admitted that it was the victim of a ransomware incident, which resulted in the...
Kubernetes Deployment on AWS Kubernetes is open-source software for deploying and managing containerized applications at scale. Kubernetes can manage clusters on Amazon...
Cybersecurity researchers have shed light on a darknet marketplace called InTheBox that’s designed to specifically cater to mobile malware operators. The actor...
Ransomware attacks keep increasing in volume and impact largely due to organizations’ weak security controls. Mid-market companies are targeted as they possess...
A persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies at lease since June 2022. “The...
A version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities due to its...
The cybersecurity company Kaspersky Labs has found “pinpoint” cyberattacks in Russia, and they have given files that are infected with a new...
A free operating system that is similar to Unix and Berkeley Unix is called FreeBSD. It is derived from Research Unix via...
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data
GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability – Patch ASAP!
Practical Guidance For Securing Your Software Supply Chain
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
New Attack Technique Exploits Microsoft Management Console Files
How to Cut Costs with a Browser Security Platform
Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations