New TLDs Like .shop, .top And .xyz Attracting Phishers
A significant surge in phishing attacks has been unveiled by a recent study conducted by Interisle Consulting, with a nearly...
Read more →A significant surge in phishing attacks has been unveiled by a recent study conducted by Interisle Consulting, with a nearly...
Read more →A high-severity type confusion vulnerability in the V8 JavaScript engine of Google Chrome was recently discovered by independent researchers. As...
Read more →A critical security flaw in Progress WhatsUp Gold, a popular network monitoring tool, has been exposed with the release of...
Read more →A critical security flaw has been discovered in Mobile Security Framework (MobSF), a popular pen-testing and malware analysis tool, potentially...
Read more →Veeam, a leading provider of backup and disaster recovery solutions, has disclosed two significant vulnerabilities affecting its Service Provider Console...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the National Security Agency (NSA), Federal Bureau of Investigation (FBI),...
Read more →A joint investigation team (JIT) involving French and Dutch authorities, with support from Eurojust and Europol, has successfully dismantled an...
Read more →Storm-1811, a financially driven threat actor that employs social engineering techniques, has recently been observed exploiting RMM tools to distribute...
Read more →The notorious SmokeLoader malware has been identified targeting firms in Taiwan, including those in manufacturing, healthcare, information technology, and other...
Read more →Cisco has confirmed that a decade-old cross-site scripting (XSS) vulnerability in its Adaptive Security Appliance (ASA) Software is currently being...
Read more →A prominent restaurant reservation platform, EazyDiner has reportedly fallen victim to a significant data breach. Hackers claim to have accessed...
Read more →A recent penetration test conducted on Salesforce Communities revealed critical vulnerabilities that could allow attackers to take over user accounts....
Read more →