Cyber Security
A North Korea based threat actor targeting personal accounts of technology firms through low-profile social engineering attempts. This campaign utilizes a combination of repository...
Hi, what are you looking for?
A North Korea based threat actor targeting personal accounts of technology firms through low-profile social engineering attempts. This campaign utilizes a combination of repository...
It has been reported that any individual could potentially deactivate a WhatsApp account by sending an email, and currently, there is no known method...
Hackers actively target vulnerable WordPress websites in an effort to take advantage of a widespread WooCommerce Payments plugin vulnerability and gain admin rights. The...
ChatGPT enhances information security by providing valuable insights for efficient reconnaissance in penetration testing and serving as an additional source of security information. Generative...
China’s Storm-0558 hacked 25 organizations, including government agencies, using fake tokens for email access, aiming at espionage since May 15, 2023. However, Storm-0558’s campaign was blocked...
In today’s age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of this, Endpoints are now...
Zoom has released security patches for 6 high and 1 low severity vulnerabilities, allowing threat actors to escalate privileges and disclose sensitive information. The CVSS...
A self-signed China-originated Rootkit acts as a universal downloader targeting gaming sectors to exfiltrate sensitive information. The threat actors abuse Microsoft signing portals to...
The ransomware attacks are becoming more frequent and rapidly increasing in size as well. This alarming pace of ransomware is significantly concerning the thousands...
Microsoft has taken another step towards security which has revolutionized the way security professionals use Microsoft 365 Defender across devices as well as cloud...
Recent Comments