Sliver Implant Attacking German Entities With Weaponized LNK Files
A sophisticated cyberattack campaign targeting German organizations has been uncovered, utilizing weaponized LNK files to deploy the Sliver implant. The...
Read more →A sophisticated cyberattack campaign targeting German organizations has been uncovered, utilizing weaponized LNK files to deploy the Sliver implant. The...
Read more →Multiple critical vulnerabilities have been discovered in HPE Aruba Network, affecting its AOS Controllers, Gateways, and Mobility Conductor products. Specifically,...
Read more →A newly identified Internet of Things (IoT) botnet has been orchestrating large-scale Distributed Denial-of-Service (DDoS) attacks globally since late 2024,...
Read more →Threat actor IntelBroker allegedly breached Hewlett Packard Enterprise (HPE) and claimed responsibility for the intrusion on a dark web forum....
Read more →A significant cybersecurity threat involving North Korean hackers exploiting LinkedIn as an entry point to infiltrate organizations. This attack has...
Read more →A sophisticated Android malware campaign targeting users in South Asia, particularly in the Kashmir region of India has been recently...
Read more →A group of researchers from Eindhoven University of Technology has unveiled a new findings that could significantly improve the efficiency...
Read more →Hackers have deployed malicious npm packages designed to exfiltrate Solana private keys through Gmail’s trusted infrastructure, as uncovered recently by...
Read more →A critical remote code execution (RCE) vulnerability designated as CVE-2024-53691 has been identified in the QNAP QTS/QuTS hero operating system....
Read more →A critical vulnerability, CVE-2024-43468, has been identified in Microsoft Configuration Manager (ConfigMgr), posing a severe security risk to organizations relying...
Read more →A zero-day vulnerability in the Windows Common Log File System (CLFS) driver, designated as CVE-2024-49138. This critical flaw, identified by...
Read more →Researchers demonstrated how attackers can bypass its protections without physically tampering with the device. The exploit, known as “bitpixie” (CVE-2023-21563),...
Read more →