What is HTTP Request Smuggling and HTTP/2 Downgrading?
Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be...
Read more →Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be...
Read more →Following an investigation into the unauthorized use and sale of geolocation data by two companies, the Federal Trade Commission (FTC)...
Read more →The FritzFrog cryptomining botnet has new potential for growth: a recently analyzed variant of the bot is exploiting the Log4Shell...
Read more →Feb 01, 2024NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking...
Read more →The US government has succeeded in disrupting a botnet created by known Chinese threat actor Volt Typhoon that had paved...
Read more →CISA has ordered U.S. federal agencies to disconnect all Ivanti Connect Secure and Policy Secure VPN appliances vulnerable to multiple...
Read more →In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on...
Read more →The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary,...
Read more →Ripple CEO Brad Garlinghouse has also confirmed that the XRP wallet belonging to Ripple’s co-founder, Chris Larsen, was indeed hacked...
Read more →The FBI has disrupted the KV botnet, used by People’s Republic of China (PRC) state-sponsored hackers (aka “Volt Typhoon”) to...
Read more →The U.S. government on Wednesday said it took steps to neutralize a botnet comprising hundreds of U.S.-based small office and...
Read more →The Department for Environment, Food and Rural Affairs (Defra) has updated what it claims to be 180 critical legacy applications....
Read more →