Blog Posts
In today’s digital age, the security of web applications is a paramount concern for businesses and...
On Thursday morning, the websites of the government, police, and intelligence services of...
A hobbyist has successfully extracted the Bitlocker decryption key of a notebook by using a...
JetBrains has issued a warning to its customers regarding a critical security vulnerability found in...
Ivanti has issued a warning to its customers regarding a significant security vulnerability present...
Fortinet has revealed a critical security vulnerability in FortiOS SSL VPN, indicating it’s...
In an EFI application named Shim, which is used by most common Linux distributions, a critical...
A security researcher from Snyk Security Labs has identified a series of vulnerabilities that allow...
Security researchers have discovered a weakness in a suite of apps developed by Navblue, a...
On February 2, 2024, the provider of remote desktop software, Anydesk, confirmed that they had...
Suspected hackers linked to the Kremlin are believed to have breached the cloud email infrastructure...
The maintainers of Jenkins, an open-source continuous integration/continuous delivery and deployment...
Cisco has issued patches to remedy a severe security vulnerability affecting its Unified...
In Microsoft’s email software Outlook, there appears to be a vulnerability that cybercriminals...
The software giant Microsoft has apparently once again fallen victim to a cyberattack. According to...
After a malicious actor took over the X-account of the US Securities and Exchange Commission (SEC)...
Cybercriminals appear to be currently exploiting the widely used remote access software TeamViewer...
Juniper Networks has issued updates to address a critical remote code execution (RCE) vulnerability...
Just when you thought you had recovered from Bleed, two vulnerabilities in NetScaler’s ADC and...
GitHub has recently disclosed the rotation of certain keys as a precautionary measure in response to...
CISA and the FBI have issued a warning regarding the deployment of the AndroxGh0st malware by threat...
Amidst the intricate fabric of our interconnected digital realm, the Domain Name System (DNS) serves...
A significant security vulnerability has been uncovered in the Sophos Firewall User Portal and...
The FBI, NSA, and other collaborating agencies have issued a warning regarding the widespread...
On December 6, 2023, the Federal Office for Information Security (BSI) issued a security advisory...
Recent revelations by cybersecurity researchers from the Systems and Network Security Group at VU...
Microsoft revealed on Monday that it had uncovered Kremlin-backed nation-state activity exploiting a...
Threat actors can exploit the Amazon Web Services Security Token Service (AWS STS) to infiltrate...
Multiple vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products...
OwnCloud recently disclosed several vulnerabilities within its namesake open-source file-hosting...
The US cybersecurity agency CISA updated its Known Exploited Vulnerabilities (KEV) catalog on...
The agency has identified a critical flaw in Sophos products, CVE-2023-1671, which has been...
The CPU manufacturer Intel recently released microcode updates to address a security vulnerability...
VMware has disclosed a critical security vulnerability affecting its Cloud Director (VCD) software...
Atlassian and the Internet Systems Consortium (ISC) have revealed multiple security vulnerabilities...
A new variant of the BlackCat Ransomware, named Sphynx, has recently emerged, showcasing enhanced...
A recent investigation conducted by Trend Micro reveals that threat groups associated with RedLine...
A newly emerged cryptojacking operation, tailored for cloud-native environments, has turned its...
Multiple Cross-Site Scripting (XSS) vulnerabilities, encompassing Stored XSS and Reflected XSS, have...
A series of memory corruption vulnerabilities has been uncovered within the ncurses (new curses)...
Three interconnected security vulnerabilities of high severity have been uncovered in Kubernetes...
A recently discovered critical security vulnerability in the WebP codec allows attackers to trigger...
Originating in 2020 and coded in Go, the BlueShell backdoor operates stealthily, utilizing TLS...
Splunk Enterprise harbors multiple vulnerabilities, including Cross-site Scripting (XSS), Denial of...
A vulnerability affecting VMware involving a SAML token signature bypass has been reported...
ArubaOS-Switch Switches have been found to contain multiple vulnerabilities, including Stored...
A serious security flaw in Microsoft’s Skype messenger allows attackers to easily spy on your...
In an attempt to evade detection, hackers have adopted a novel technique known as “MalDoc in...
The U.S. Federal Bureau of Investigation (FBI) has issued a stark warning regarding Barracuda...
In a recent supply chain infiltration aimed at implanting the Korplug backdoor (also known as PlugX)...
A significant security vulnerability has been revealed in the WinRAR utility, which has the...
A blind XPath injection vulnerability has been uncovered in Apache Ivy, a component of the Apache...
Two Server-Side Request Forgery (SSRF) vulnerabilities have been identified in Apache Batik...
Over the past half-year, there has been a significant uptick, a staggering 61-fold increase, in the...
While many Citrix Netscaler servers have been patched for a vulnerability known since July...
Around 2,000 Citrix NetScaler instances have fallen victim to a backdoor attack, leveraging a...
HPE Aruba Networking has identified two critical vulnerabilities, CVE-2023-38401 and CVE-2023-38402...
A vulnerability in the web-based management interface of both Cisco Unified Communications Manager...
The cybercrime group responsible for Raccoon Stealer has made a comeback after a six-month break...
A critical security vulnerability has been identified in Python’s URL parsing function...
ChatGPT, quickly amassing over 100 million users following its release, has been part of a trend...
Microsoft’s security researchers recently highlighted a series of severe vulnerabilities in...
Attackers are increasingly exploiting Microsoft identities to access both Microsoft and federated...
IBM SDK’s Java Technology Edition has identified a critical vulnerability that permits...
Hundreds of Citrix NetScaler ADC and Gateway servers have been breached by malicious actors to...
Cybersecurity experts have recently unveiled a series of side-channel vulnerabilities in modern CPUs...
Increasingly, cybercriminals are exploiting a phishing toolkit named EvilProxy for account takeover...
The TargetCompany ransomware, also known as Mallox, Fargo, and Tohnichi, is actively targeting...
Researchers at ETH Zurich have uncovered a new exploit attack named “Inception,”...
Recent findings indicate that cybercriminals are exploiting Cloudflare Tunnels to create hidden...
A vulnerability in the Mozilla VPN client for Linux allows attackers to modify the VPN configuration...
Multiple Citrix NetScaler ADC and Gateway servers have been compromised by attackers using a...
Since May 2023, a Russian hacker group known as APT29, Midnight Blizzard, UNC2452, or Cozy Bear...
Mullvad, a VPN provider, has identified a privacy concern for Android users: devices may...
Apache Tomcat, a widely used open-source server, provides support for Jakarta Servlet, Expression...
Two critical vulnerabilities in Ubuntu’s OverlayFS module are endangering numerous server...
A recently identified and now rectified vulnerability in OpenSSH had raised concerns due to its...
Two recently discovered security flaws in the AMI MegaRAC Baseboard Management Controller (BMC)...
Despite the availability of patches, approximately 15,000 Citrix servers accessible over the...
The recent security breach involving Microsoft’s email infrastructure was carried out by a...
The cybercrime group FIN8, known for financially motivated attacks, has recently updated its...
A newly identified cybersecurity menace, the P2PInfect worm, has been causing severe disruptions...
Multiple ransomware groups are exploiting critical vulnerabilities in Atlassian Confluence and...
A recent report from Cloudflare reveals that sophisticated Distributed Denial of Service (DDoS)...
According to a recent report from Palo Alto Networks Unit 42, Mallox ransomware activities in 2023...
Charter Oak Federal Credit Union officials reported that an unidentifiable group of cybercriminals...
Anyone who tried to access the Cash website since Saturday morning likely encountered problems. The...
Recently, scammers made alterations to the contact information displayed in Google search results...
Mobile employees provide attackers with new attack surfaces. They increasingly initiate attacks to...
Mullvad, a VPN provider focused on security and privacy, has identified a potential data leakage...
The Qualys Threat Research Unit (TRU) has identified a critical remote code execution vulnerability...
Two critical vulnerabilities have been identified in VMware Tools and labeled CVE-2023-34057 and...
The threat actor modified the backdoor on Cisco devices by exploiting two zero-day vulnerabilities...
VMware, a provider of virtualization services, has notified its customers of the discovery of a...
Cloudflare announced Thursday that it has successfully mitigated thousands of high-volume HTTP...
According to Unciphered, crypto experts claim to have found a way to unlock an encrypted USB hard...
Cisco has issued a serious warning regarding a critical security vulnerability that is unpatched and...
D-Link, a Taiwanese manufacturer of networking devices, has admitted to a data breach in which...
A continuous cyber espionage campaign called TetrisPhantom is targeting government institutions in...
A unique DDoS attack based on HTTP/2 targeted multiple Google services and cloud users. The...
- 1
- 2