Hackers have deployed a Linux backdoor to attack government entities
Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen before. This new backdoor has…
Recent reports indicate that threat actors have been using a new type of Linux-targeted backdoor that has never been seen before. This new backdoor has…
Sep 20, 2023THNMalware Attack / Cyber Threat Chinese-language speakers have been increasingly targeted as part of multiple email phishing campaigns that aim to distribute various…
Two vulnerabilities discovered earlier this year in Atos Unify products could allow malicious actors to cause disruption and even backdoor the targeted system. The flaws…
International Criminal Court hit with a cyber attack Pierluigi Paganini September 20, 2023 A cyberattack hit the International Criminal Court (ICC) disclosed a cyberattack this…
Konni, a North Korean APT group, launched the first attack against the cryptocurrency industry, exploiting a recently found WinRAR vulnerability tagged as CVE-2023-38831. According to the study,…
Recent reports indicate that Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use for…
In the face of a cyber attack targeting a company’s IT infrastructure, the world expects swift and effective responses from its CEOs and CTOs to…
Sep 20, 2023THNKubernetes / Supply Chain Attack Cybersecurity researchers have discovered a fresh batch of malicious packages in the npm package registry that are designed…
TransUnion, the American consumer credit reporting agency, has refuted claims of a TransUnion data leak after cybercriminal USDoD claimed to expose sensitive data obtained following…
The American University of Antigua (AUA) has become the latest target of the ALPHV ransomware group. The American University of Antigua cyber attack has resulted…
DevOps platform GitLab this week announced the release of security updates that address a critical-severity vulnerability allowing an attacker to run pipelines as another user.…
If you are using Trend Micro Apex One, be aware that there may be a vulnerability in the third-party Antivirus uninstaller module. This vulnerability could…