Cybersecurity researchers have detailed the inner workings of ShadowPad, a sophisticated and modular backdoor that has been adopted by a growing number...
Entities in the aviation, aerospace, transportation, manufacturing, and defense industries have been targeted by a persistent threat group since at least 2017...
The wide-ranging adoption of cloud facilities and the subsequent mushrooming of organizations’ networks, combined with the recent migration to remote work, had...
A threat actor, likely Chinese in origin, is actively attempting to exploit a zero-day vulnerability in the Zimbra open-source email platform as...
Cisco has patched multiple critical security vulnerabilities impacting its RV Series routers that could be weaponized to elevate privileges and execute arbitrary...
An ongoing search engine optimization (SEO) poisoning attack campaign has been observed abusing trust in legitimate software utilities to trick users into...
We hear about the need for better visibility in the cybersecurity space – detecting threats earlier and more accurately. We often hear...
An active espionage campaign has been attributed to the threat actor known as Molerats that abuses legitimate cloud services like Google Drive...
An exploration of zero-click attack surface for the popular video conferencing solution Zoom has yielded two previously undisclosed security vulnerabilities that could...
A threat actor with potential links to an Indian cybersecurity company has been nothing if remarkably persistent in its attacks against military...
An IRC (Internet Relay Chat) bot strain programmed in GoLang is being used to launch distributed denial-of-service (DDoS) attacks targeting users in...
An elusive threat actor called Earth Lusca has been observed striking organizations across the world as part of what appears to be...
Apple on Wednesday rolled out software updates for iOS and iPadOS to remediate a persistent denial-of-service (DoS) issue affecting the HomeKit smart...
Researchers have disclosed a novel technique by which malware on iOS can achieve persistence on an infected device by faking its shutdown...
An ongoing ZLoader malware campaign has been uncovered exploiting remote monitoring tools and a nine-year-old flaw concerning Microsoft’s digital signature verification to...
Apple recently fixed a security vulnerability in the macOS operating system that could be potentially exploited by a threat actor to “trivially...
Microsoft said it won’t be fixing or is pushing patches to a later date for three of the four security flaws uncovered...
Transportation industry and government agencies related to the sector are the victims of an ongoing campaign since July 2020 by a sophisticated...
The last several years have seen an ever-increasing number of cyber-attacks, and while the frequency of such attacks has increased, so too...
As a CISO, one of the most challenging questions to answer is “How well are we protected right now?” Between the acceleration...
At least 300,000 IP addresses associated with MikroTik devices have been found vulnerable to multiple remotely exploitable security vulnerabilities that have since...