Subscribe to our mailing list to receives daily updates!
As more and more vulnerabilities and security flaws have surfaced throughout the rapidly changing cyber landscape, the need to keep...
The new era of the digital domain has brought the world closer together in unprecedented ways, offering a level of...
IntroductionDiscovered in 2010 and originating from China, Lotus Panda is an APT group also known as Spring Dragon, ST Group,...
What is the Dark Web Forum? Why do These Exist?Those who advocate anonymity, freedom of expression, and privacy heavily use...
IntroductionDiscovered in 2014 and originating from Iran, APT39 has carved out a unique place for itself on the global cybersecurity...
What Is the Dark Web, and Why Does It Exist?The dark web is an unknown hidden part of the internet...
Cyber threat intelligence is a crucial aspect of cybersecurity and is becoming increasingly important as threats evolve and become more...
On October 25, the OpenSSL team has announced that a security patch for a critical vulnerability in OpenSSL version 3.x...
The proof-of-concept exploit code is publicly available for a critical authentication bypass vulnerability in multiple VMware products that allows attackers...
Cisco has confirmed that the Yanluowang ransomware group has breached the company’s network and that the actor has attempted to...
As part of the Justice Awards program, the US State Department announced that a $10 million reward will be offered...
PyPI Package ‘secretslib’ Drops Fileless Cryptominer to Linux Systems A PyPI package named “secretslib” has been identified by Sonatype, which...
The Microsoft Threat Intelligence Center (MSTIC) has taken action and taken measures to disrupt the campaigns launched by the SEABORGIUM...
Kaspersky analyzed threat statistics by processing data voluntarily shared by its users for the period from January 2020 to June...
Google has released security updates for many vulnerabilities, including the zero-day vulnerability for the Chrome browser. These defects are known...
APT41, one of the state-sponsored ex-hacker groups, breached government networks in six US states in March 2022, including by exploiting...
DDoS protection pages typically verify whether the site visitor is actually a human or part of a Distributed Denial of...
CISA added Palo Alto Networks PAN-OS to its Catalog of Known Exploited Vulnerabilities based on evidence of active exploitation This...
The Microsoft Threat Intelligence Center (MSTIC) and Microsoft 365 Defender Research Team found that Iran-based threat actor MERCURY exploited Log4j...
LastPass, one of the world's largest password managers, has confirmed that it has been hacked. The company revealed that threat...
The adware 'Internet Download Manager' Google Chrome extension has been installed by more than 200,000 users. According to reviews, this...
The Chinese state-owned threat actor, APT40, targets Australian government agencies, Australian media companies and manufacturers that maintain wind turbine fleets...
The Importance of Attack Surface Management for Organizations Today, with the transition of organizations from traditional business processes to digital...
Introduction A new Stealer named Akira has been put up for sale on Telegram. It has the following features: Password...
What is ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant of...
Who is TA558? TA558, a financially-motivated cybercrime group, has been targeting the hospitality, travel, and related industries located in Latin...
What is the ChatGPT? ChatGPT is an AI driven chatbot launched by OpenAI in November 2022. ChatGPT is a variant...
Phishing mail targeting Turkish companies has been detected. Mail attachment contains an RFQ file. Normally, a request for quotation (RFQ)...
Cloud computing has garnered the attention of the Department of Defense as data and computer processing needs grow and budgets...
Internet-connected devices like smart thermostats, voice-activated assistants, and web-enabled refrigerators have become ubiquitous in American homes. These technologies are part...