Oct 18, 2023NewsroomRootkit / Cryptocurrency A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupy...
Category: Attack
Oct 18, 2023NewsroomCyber Espionage / Malware Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber esp...
Oct 18, 2023NewsroomVulnerability / Data Security A medium-severity flaw has been discovered in Synology's DiskStation Manager (DSM) that coul...
Oct 18, 2023NewsroomData Breach / Network Security Taiwanese networking equipment manufacturer D-Link has confirmed a data breach that led to ...
Oct 17, 2023NewsroomMalware / APT In what's the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new fi...
Oct 17, 2023NewsroomVulnerability / Cyber Threat Two critical security flaws discovered in the open-source CasaOS personal cloud software coul...
Oct 17, 2023NewsroomData Security / Network Security A severity flaw impacting industrial cellular routers from Milesight may have been active...
Oct 17, 2023The Hacker NewsData Security / Infosec Webinar Financial data is much more than just a collection of numbers; it is a crucial comp...
Recently, the cybersecurity landscape has been confronted with a daunting new reality – the rise of malicious Generative AI, like FraudGPT and W...
Oct 17, 2023NewsroomCyber Attack / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has revealed that threat actors "interfer...
