Androxgh0st Malware Building Mega-Botnet for Credential Theft
The FBI and CISA have jointly issued a security advisory, cautioning about the growing threat posed by the AndroxGh0st malware. Operators of this malware are…
The FBI and CISA have jointly issued a security advisory, cautioning about the growing threat posed by the AndroxGh0st malware. Operators of this malware are…
A critical vulnerability (CVE-2023-34063) affecting VMware Aria Automation and VMware Cloud Foundation can be exploited by attackers to gain access to remote organizations and workflows,…
Jan 18, 2024NewsroomFirmware Security / Vulnerability Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation of the…
Ciaran Martin, the founding chief executive of the UK’s National Cyber Security Centre (NCSC), is to join the recently launched Cyber Monitoring Centre (CMC) non-profit…
The Akira ransomware group has recently targeted DENHAM the Jeanmaker, a renowned denim brand established in Amsterdam in 2008. The brand, founded by English jeanmaker…
Multiple Atlassian Jira products are experiencing an ongoing outage as of this morning. Users of Jira Work management, Jira Software, Jira Service Management and Jira…
Hackers frequently target researchers to get illegal access to important research data, intellectual property, and highly sensitive information. The threat actors can exploit this information…
Cisco NetScaler ADC and NetScaler Gateway have been discovered to have two vulnerabilities, which were associated with remote code execution and denial of service. The…
In this Help Net Security interview, Tim Morris, Chief Security Advisor at Tanium, discusses ransomware negotiation, how it typically unfolds, and how organizations should have…
The notorious hacking group, Anonymous Sudan, has taken credit for a “huge” cyberattack on Bazan Group, formerly known as Oil Refineries Ltd, Israel’s leading oil…
When launching a new bug bounty program, there’s usually a discussion around which department should ‘foot the bill’ for the costs of the rewards. It’s…
Hackers exploit Remote Code Execution (RCE) vulnerabilities as they allow them to execute arbitrary code on a target system remotely. This unauthorized access enables the…