Picture this: you stumble upon a concealed secret within your company's source code. Instantly, a wave of panic hits as you grasp the possible c...
Category: Attack
î ‚Jan 05, 2024î „NewsroomCyber Attack / Data Breach Ukrainian cybersecurity authorities have disclosed that the Russian state-sponsored threat acto...
î ‚Jan 05, 2024î „NewsroomVulnerability / Network Security Ivanti has released security updates to address a critical flaw impacting its Endpoint Ma...
î ‚Jan 05, 2024î „NewsroomMalware / Cyber Espionage A new variant of remote access trojan called Bandook has been observed being propagated via phis...
î ‚Jan 04, 2024î „The Hacker NewsEthical Hacking / Vulnerability Assessment Section four of the "Executive Order on Improving the Nation's Cybersecu...
î ‚Jan 04, 2024î „NewsroomCryptocurrency Miner / Malware Three new malicious packages have been discovered in the Python Package Index (PyPI) open-s...
î ‚Jan 04, 2024î „NewsroomSoftware Security / Malware The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT usi...
î ‚Jan 04, 2024î „NewsroomCryptocurrency / Social Media American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter...
î ‚Jan 03, 2024î „NewsroomMalware / Data Theft Information stealing malware are actively taking advantage of an undocumented Google OAuth endpoint n...
î ‚Jan 03, 2024î „NewsroomCyber Threat / Email Security A new exploitation technique called Simple Mail Transfer Protocol (SMTP) smuggling can be we...
