Aug 03, 2023THNCyber Attack / Phishing Microsoft on Wednesday disclosed that it identified a set of highly targeted social engineering attacks...
Category: Attack
Aug 03, 2023THNVulnerability / Software Security Cybersecurity researchers have discovered a bypass for a recently fixed actively exploited vu...
Aug 02, 2023THNICS/SCADA Security About 34% of security vulnerabilities impacting industrial control systems (ICSs) that were reported in the ...
Aug 02, 2023THNVulnerability / A sophisticated Facebook phishing campaign has been observed exploiting a zero-day flaw in Salesforce's email s...
Aug 02, 2023THNCyber Threat / Hacking A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group is actively modifyi...
Aug 02, 2023THNCloud Security / Cyber Threat Cybersecurity researchers have discovered a new post-exploitation technique in Amazon Web Service...
In recent years the rise of illicit activities conducted within online messaging platforms has become a growing concern for countless industries...
Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat ...
Aug 02, 2023THNVulnerability / Cyber Attack Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Iva...
Aug 01, 2023THNCryptocurrency / Malware Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equi...
