Oct 20, 2023NewsroomOnline Seucrity / Cyber Threat The U.S. government has announced the seizure of 17 website domains used by North Korean in...
Category: Attack
An updated version of a sophisticated backdoor framework called MATA has been used in attacks aimed at over a dozen Eastern European companies i...
Oct 19, 2023NewsroomMobile Security / Technology Google has announced an update to its Play Protect with support for real-time scanning at the...
The time between a vulnerability being discovered and hackers exploiting it is narrower than ever – just 12 days. So it makes sense that organiz...
Oct 19, 2023NewsroomCyber Attack / Cyber Espionage The Iran-linked OilRig threat actor targeted an unnamed Middle East government between Febr...
Oct 19, 2023Newsroom North Korean threat actors are actively exploiting a critical security flaw in JetBrains TeamCity to opportunistically br...
Oct 19, 2023NewsroomCyber Threat / Vulnerability A number of state-back threat actors from Russia and China have been observed exploiting a re...
Oct 18, 2023NewsroomCyber Attack / Malware The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using troj...
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within organizational environme...
Oct 18, 2023NewsroomEnterprise Security / Vulnerability Citrix is warning of exploitation of a recently disclosed critical security flaw in Ne...
