Over 11M SSH Servers are Vulnerable to new Terrapin Attack
Previously, in December 2023, it was reported that SSH servers were vulnerable to the new Terrapin Attack in which threat actors can downgrade an SSH…
Previously, in December 2023, it was reported that SSH servers were vulnerable to the new Terrapin Attack in which threat actors can downgrade an SSH…
A free and open-source packet analyzer, Wireshark is used for network troubleshooting, education, software and communications protocol development, and analysis. The widespread use of Wireshark…
In recent months, a staggering 29 malware families have been discovered targeting approximately 1800 banking applications worldwide. This revelation, based on a comprehensive survey conducted…
Malicious stockpiled domains are the collection of domain names that threat actors acquire in advance for several types of future malicious activities like:- Phishing attacks…
Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a central component in many organizations,…
Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called “everything,” and others named a variation of the word. The…
On Wednesday, the London Public Library stated that certain workers’ personal information was stolen by the hackers responsible for the incident. However, there is no…
Jan 04, 2024NewsroomSoftware Security / Malware The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new strategies to evade…
Wireshark is a popular open-source network protocol analyzer that allows users to inspect and capture data on a network in real time. It enables detailed…
The Kershaw County School District, a prominent educational institution in the USA, has allegedly fallen victim to a cyberattack by the notorious Black Suit ransomware…
A threat actor named “xc7d2f4” is allegedly selling remote command injection vulnerability for Cisco ASA. The threat actor has claimed that this vulnerability exists on…
Jan 04, 2024NewsroomCryptocurrency / Social Media American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account compromised for more than six…