Threat Actor Server Exposed: Nmap, SQLMap for Hacking
The Research Team has identified an exposed web server used to target the Taiwanese Freeway Bureau and a local data center. The server’s administrator employed…
The Research Team has identified an exposed web server used to target the Taiwanese Freeway Bureau and a local data center. The server’s administrator employed…
Jun 20, 2024NewsroomThreat Intelligence / Cybercrime A new Rust-based information stealer malware called Fickle Stealer has been observed being delivered via multiple attack chains with…
An unpatched bug allows anyone to impersonate Microsoft corporate email accounts Pierluigi Paganini June 20, 2024 A researcher discovered a flaw that allows attackers to…
Hackers often abuse stealers to steal login credentials, financial data, and identity theft data hidden in the infected computer systems. Stealer attacks are a low-risk…
Verimatrix announced major enhancements to its XTD dashboard, providing customers with better visibility into application security risks and more actionable insights to better protect mobile…
The Post Office’s relationship with IT supplier Fujitsu was “tense” in 2010 amid major problems rolling out the online version of the controversial Horizon computer…
The European Union has introduced two critical regulatory frameworks: the Network and Information Security (NIS) Directive and the Digital Operational Resilience Act (DORA). These measures…
Fortra has issued a critical security advisory regarding a hard-coded password vulnerability in its FileCatalyst software, explicitly affecting the TransferAgent component. CVE-2024-5275 vulnerability poses a…
Threat actors leverage meeting software applications and tools to penetrate weak security loopholes, infiltrate secure settings and organizations, steal highly confidential information, and restrict organizational…
Threat actors exploit Linux systems because they are prevalent in organizations that host servers, databases, and other important resources. Exploiting vulnerabilities in Linux systems allows…
Jun 20, 2024NewsroomMalware / Cyber Attack Cybersecurity researchers have uncovered a new evasive malware loader named SquidLoader that spreads via phishing campaigns targeting Chinese organizations.…
CDK Global, a provider of software solutions to auto dealerships across the United States, has fallen victim to a significant cyberattack. This CDK Global cyberattack…