No menu items!
No menu items!
More

    News

    Inferno Malware Masqueraded as Coinbase, Drained $87 Million from 137,000 Victims

    Jan 16, 2024NewsroomCryptocurrency / Cyber Threat The operators behind the now-defunct Inferno Drainer created more than 16,000 unique malicious domains over a span of...

    New Python-based FBot Hacking Toolkit Aims at Cloud and SaaS Platforms

    Jan 11, 2024NewsroomCloud Security / Cyber Attacks A new Python-based hacking tool called FBot has been uncovered targeting web servers, cloud services, content management...

    New PoC Exploit for Apache OfBiz Vulnerability Poses Risk to ERP Systems

    Jan 11, 2024NewsroomVulnerability / Cyber Attack Cybersecurity researchers have developed a proof-of-concept (PoC) code that exploits a recently disclosed critical flaw in the Apache...

    Threat Actors Increasingly Abusing GitHub for Malicious Purposes

    Jan 11, 2024NewsroomCybersecurity / Software Security The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat actors...

    CISA Flags Active Exploitation of Microsoft SharePoint Vulnerability

    Jan 12, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server...

    Cryptominers Targeting Misconfigured Apache Hadoop and Flink with Rootkit in New Attacks

    Jan 12, 2024NewsroomCryptocurrency / Malware Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners...

    Urgent: GitLab Releases Patch for Critical Vulnerabilities

    Jan 12, 2024NewsroomDevSecOps / Software security GitLab has released security updates to address two critical vulnerabilities, including one that could be exploited to take...

    Why Attack Simulation is Key to Avoiding a KO

    Picture a cybersecurity landscape where defenses are impenetrable, and threats are nothing more than mere disturbances deflected by a strong shield. Sadly, this...

    From Data Leaks to Multi-Extortion

    The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data leak site on...

    Latest articles

    spot_imgspot_img