Splunk SOAR Log Injection – Execute Malicious Code
Splunk has discovered a vulnerability that allows unauthenticated log injection, which could enable malicious actors to run harmful code on...
Read more →Splunk has discovered a vulnerability that allows unauthenticated log injection, which could enable malicious actors to run harmful code on...
Read more →According to reports, a new Android malware is circulating under the guise of a fake chat application that is being...
Read more →Aug 02, 2023THNRansoware / Cyber Crime Services offered by an obscure Iranian company known as Cloudzy are being leveraged by...
Read more →Akira ransomware group added U.S.-based software company Parathon to its victim list. The hackers claimed to have 560 GB of...
Read more →Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing...
Read more →High-profile ransomware attacks on corporations like Kaseya, Colonial Pipeline, and MOVEit may lead to the misconception that only large organizations...
Read more →Google introduced eight new top-level domains at the beginning of May, such as .dad, .phd, .prof, .esq, .foo, .zip, .mov,...
Read more →The Italian organizations, including tax agencies, were targeted by a new malware downloader delivering banking Trojan. The new loader malware...
Read more →Microsoft has issued an alert on the OneNote spoofing vulnerability, patched previously. According to the latest update from Microsoft, the...
Read more →US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog....
Read more →QNAP operating systems are robust, user-friendly software platforms that power NAS and NVR devices. QNAP offers four operating systems, and...
Read more →The updated Burp suite scanner has new add-on features and bug fixes that enhance the scanning process’s overall performance. Burp...
Read more →