Aug 02, 2023THNICS/SCADA Security About 34% of security vulnerabilities impacting industrial control systems (ICSs) that were reported in the ...
Category: Attack
Aug 02, 2023THNVulnerability / A sophisticated Facebook phishing campaign has been observed exploiting a zero-day flaw in Salesforce's email s...
Aug 02, 2023THNCyber Threat / Hacking A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group is actively modifyi...
Aug 02, 2023THNCloud Security / Cyber Threat Cybersecurity researchers have discovered a new post-exploitation technique in Amazon Web Service...
In recent years the rise of illicit activities conducted within online messaging platforms has become a growing concern for countless industries...
Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat ...
Aug 02, 2023THNVulnerability / Cyber Attack Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Iva...
Aug 01, 2023THNCryptocurrency / Malware Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equi...
Aug 01, 2023THNCyber Attack / Malware The threat actor known as Space Pirates has been linked to attacks against at least 16 organizations in ...
Aug 01, 2023THNMobile Security / Malware Various European customers of different banks are being targeted by an Android banking trojan called ...