Since threat actors aggressively exploit AI technology for a variety of illegal objectives, the whole danger landscape is undergoing a profound transformation as...
Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat actors, including cybercrime groups and nation-state...
TP-Link has released a fix for a severe vulnerability in its Archer AX21 router. This vulnerability might have allowed attackers to take...
Because to a “cybersecurity event” that occurred on July 23, Tempur Sealy International was forced to shut down some of its information...
It has come to light that the Ninja Forms plugin for WordPress has many security flaws that might be abused by malicious...
Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research organizations in China as part...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a “novel persistent backdoor” called SUBMARINE deployed by threat...
This “pure Java” HTTP web server environment is provided by Apache Tomcat, which is a server that is both open-source and free...
The latest research discovered malvertising campaigns abusing Google and Bing ads to target users seeking certain IT tools and deploying ransomware. This...
Following the failure of an online application platform that made the majority of government services unavailable, Kenya said on Thursday that it...
Two vulnerabilities in the Linux operating system Ubuntu have been found by researchers. Both of these vulnerabilities have the ability to offer...
Misconfigured and poorly secured Apache Tomcat servers are being targeted as part of a new campaign designed to deliver the Mirai botnet...
A recent cyberattack on the Wuhan Earthquake Monitoring Center was carried out by an entity located outside of China, according to a...
A severe privilege escalation issue impacting MikroTik RouterOS could be weaponized by remote malicious actors to execute arbitrary code and seize full...
Global radios depend on the TETRA (Terrestrial Trunked Radio) standard, however a number of vulnerabilities have been found that have an influence...
North Korean nation-state actors affiliated with the Reconnaissance General Bureau (RGB) have been attributed to the JumpCloud hack following an operational security...
Recent news reports have brought attention to two serious zero-day vulnerabilities that pose a risk to the digital security of Apple products...
It is thought that tens of thousands, if not hundreds of thousands, of employees were impacted by a cyberattack that took place...
The use of illegal software has been under circulation ever since there have been torrents and cracked software. Recent reports show that...
Syssphinx (aka FIN8) is a financially motivated cyber-crime group deploying revamped sardonic backdoor to deliver Noberus ransomware. This group has been active since...
The Cybersecurity and Infrastructure Security Agency (CISA) has come up with a list of free tools that businesses may use to protect...