No menu items!
No menu items!
More

    News

    New Malware Technique Could Exploit Windows UI Framework to Evade EDR Tools

    Dec 11, 2024Ravie LakshmananMalware / Endpoint Security A newly devised technique leverages a Windows accessibility framework called UI Automation (UIA) to perform a wide...

    Microsoft MFA AuthQuake Flaw Enabled Unlimited Brute-Force Attempts Without Alerts

    Dec 11, 2024Ravie LakshmananVulnerability / Authentication Cybersecurity researchers have flagged a "critical" security vulnerability in Microsoft's multi-factor authentication (MFA) implementation that allows an attacker...

    Researchers Uncover Espionage Tactics of China-Based APT Groups in Southeast Asia

    Dec 11, 2024Ravie LakshmananCyber Espionage / Cyber Attack A suspected China-based threat actor has been linked to a series of cyber attacks targeting high-profile...

    Chinese EagleMsgSpy Spyware Found Exploiting Mobile Devices Since 2017

    Cybersecurity researchers have discovered a novel surveillance program that's suspected to be used by Chinese police departments as a lawful intercept tool to...

    Microsoft Fixes 72 Flaws, Including Patch for Actively Exploited CLFS Vulnerability

    Microsoft closed out its Patch Tuesday updates for 2024 with fixes for a total of 72 security flaws spanning its software portfolio, including...

    U.S. Charges Chinese Hacker for Exploiting Zero-Day in 81,000 Sophos Firewalls

    Dec 11, 2024Ravie LakshmananVulnerability / Data Breach The U.S. government on Tuesday unsealed charges against a Chinese national for allegedly breaking into thousands of...

    Ivanti Issues Critical Security Updates for CSA and Connect Secure Vulnerabilities

    Dec 11, 2024Ravie LakshmananVulnerability / Network Security Ivanti has released security updates to address multiple critical flaws in its Cloud Services Application (CSA) and...

    Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged

    Dec 10, 2024Ravie LakshmananVulnerability / Threat Analysis Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed...

    Hackers Weaponize Visual Studio Code Remote Tunnels for Cyber Espionage

    Dec 10, 2024Ravie LakshmananCyber Espionage / Hacking News A suspected China-nexus cyber espionage group has been attributed to an attacks targeting large business-to-business IT...

    Latest articles

    spot_imgspot_img