Cybercriminals Exploit Microsoft Word Vulnerabilities to Deploy LokiBot Malware
Jul 17, 2023THNMalware / Cyber Threat Microsoft Word documents exploiting known remote code execution flaws are being used as phishing lures to drop malware called…
Jul 17, 2023THNMalware / Cyber Threat Microsoft Word documents exploiting known remote code execution flaws are being used as phishing lures to drop malware called…
On the other hand, AI can also be a powerful tool within the hands of cyber security professionals, with many AI-powered security technologies being developed…
Adobe on Friday announced patches for a critical-severity vulnerability in ColdFusion that could be exploited to achieve arbitrary code execution. Tracked as CVE-2023-38203 (CVSS score…
Anonymous Sudan announced that the hacktivist group launched a test attack against PayPal. The PayPal cyber attack lasted 30 seconds, according to the Telegram message…
In a concerning development, Usersec, a notorious hacker collective, has joined forces with the newly reactivated Anonymous Russia to carry out a series of website…
The owner of the BreachForums Conor Brian Fitzpatrick, aka Pompompurin, pleads guilty to hacking charges. The owner of the BreachForums Conor Brian Fitzpatrick agrees to…
Cisco warns of a critical unauthenticated REST API access vulnerability, tracked as CVE-2023-20214, impacting its SD-WAN vManage. Cisco addressed a critical unauthenticated REST API access…
Black Box Penetration Testing to the organization is from an external point of view and tests an external network with zero information. The objective was…
Jul 17, 2023THNCyber Attack / Data Safety The Russia-linked threat actor known as Gamaredon has been observed conducting data exfiltration activities within an hour of…
According to a recent report by cybersecurity firm SlashNext, a newly developed AI tool called WormGPT is being employed by cybercriminals to launch business email…
In today’s ever-evolving digital landscape, businesses face an array of threats that can compromise their operations, reputation, and bottom line. To safeguard against these risks…
In this Help Net Security interview, Charles Brooks, Adjunct Professor at Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, talks about how zero trust…