The widely used MySQL2 has been discovered to have three critical vulnerabilities: remote Code execution, Arbitrary code...
Month: April 2024
AI-powered generative tools have supercharged phishing threats, so even newbie attackers can effortlessly create refined, individualized campaigns....
A new type of Remote Access Trojan (RAT) named Spyroid has been identified. This malicious software is...
Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has...
Cybersecurity researchers have discovered a “renewed” cyber espionage campaign targeting users in South Asia with the aim...
Analysts from Silent Push, a data analytics firm, have uncovered several UK government websites sending user data...
High-end APT groups perform highly interesting social engineering campaigns in order to penetrate well-protected targets. For example,...
Law enforcement operations disrupted BlackCat and LockBit RaaS operations, including sanctions on LockBit members aiming to undermine...
The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) on Friday announced sanctions against an official...
A former security engineer has been sentenced to three years in prison in the U.S. for charges relating to...