Researchers Uncovered the Developer of CypherRAT & CraxsRAT
Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT. EVLF has been selling CraxsRAT,…
Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT. EVLF has been selling CraxsRAT,…
By Dr. Terence Liu, CEO, TXOne Networks Highly publicized cyberattacks have focused governments globally on re-examining and bolstering their cybersecurity regulations and policies, and it’s…
By Giri Radhakrishnan, Technical Product Marketing Manager, Tigera Distributed Denial-of-Service (DDoS) attack techniques are evolving, creating new risks and challenges for cloud-first enterprises. In a…
A recent HiatusRAT campaign has been targeting a US military procurement system for reconnaissance, cybersecurity firm Lumen reports. Initially observed at the beginning of the…
Microsoft is adding the Python programming language to Microsoft Excel, allowing users to create powerful functions for analyzing and manipulating data. The public preview of…
A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data and access sensitive information that…
By Matt Honea, Head of Security and Compliance, Forward Networks The challenge to adequately secure a large complex enterprise network, including the infrastructure and critical…
By Ariel Weintraub, Head of Enterprise Cyber Security, MassMutual More than three million cybersecurity professionals are needed across the globe to meet threat demands, according…
Four vulnerabilities identified by academic researchers from Italy and the UK in the TP-Link Tapo L530E smart bulb and its accompanying mobile application can be…
In today’s digital era, AI (Artificial Intelligence) and ML (Machine Learning) applications are one of the key developments. But, with global initiatives like the EU…
ISACA announces a strategic partnership with the Cyber Security Innovation (CSI) Centre at Aston University to provide the next generation of professionals with globally recognised…
Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability on Junos OS on SRX…