New Phishing Attack Exploiting HubSpot Tools To Steal Microsoft Azure Logins
A sophisticated phishing campaign targeting European companies. The attack, which peaked in June 2024, aims to harvest Microsoft Azure cloud...
Read more →A sophisticated phishing campaign targeting European companies. The attack, which peaked in June 2024, aims to harvest Microsoft Azure cloud...
Read more →A critical security vulnerability tracked as CVE-2024-51479 has been identified in Next.js, a widely used React framework for building web...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, highlighting...
Read more →US authorities are considering a ban on TP-Link routers due to concerns over their potential role in Chinese cyber attacks....
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) has issued a stark warning to senior government officials and political figures to...
Read more →A recent security investigation has uncovered a series of vulnerabilities in GStreamer, the open-source multimedia framework integral to GNOME-based Linux...
Read more →Okta, a leading identity and access management platform, has issued a warning about an increase in sophisticated phishing attacks targeting...
Read more →A sophisticated attack campaign leveraging Cloudflare’s Workers service to distribute malicious applications disguised as legitimate software. The Computer Emergency Response...
Read more →INTERPOL is advocating for a shift in terminology to combat online relationships and investment fraud. The international police organization is...
Read more →The BADBOX botnet, a sophisticated cybercriminal operation, has compromised approximately 74,000 devices, including Android TV boxes, smartphones, and other electronics....
Read more →The notorious hacker IntelBroker has leaked 2.9GB of data allegedly stolen from Cisco’s DevHub environment. This partial leak, disclosed on...
Read more →A sophisticated cyber espionage campaign leveraging red team tools to exploit Remote Desktop Protocol (RDP) servers has been uncovered, with...
Read more →