Category: CyberSecurityNews
Apple launched the Security Research Device (SRD) program, enabling security researchers to examine the security features of a specially-built hardware…
A new sophisticated cyber espionage group named Earth Estries, which overlaps notorious threat group FamousSparrow, was unveiled. The group has…
Recently, threat actors have been utilizing brute force attacks to compromise exposed MSSQL databases to distribute the FreeWorld ransomware. This attack…
Recent reports suggest threat actors have used phishing emails to distribute fileless malware. The attachment consists of a .hta (HTML…
ReversingLabs spotted “VMConnect” in early August, a malicious supply chain campaign with two dozen rogue Python packages on PyPI. It’s…
SapphireStealer is an open-source information stealer that may be utilized for obtaining sensitive information, such as corporate credentials, which are frequently…
Junos OS and Junos OS Evolved have been found to be vulnerable to a DoS (Denial of Service) condition, which…
On August 30, 2023, a malicious actor gained unauthorized access to specific Sourcegraph(.)com data through a leaked admin access token….
Recently, cybersecurity researchers at Deep Instinct have asserted that hackers can exploit the Windows container isolation framework to bypass the…
With the growing trend of businesses transitioning their operations to cloud-based Software as a Service (SaaS) platforms, ensuring the security…
The internet and new technologies have become central to the day-to-day happenings of many businesses worldwide. Remote working has become…
Cisco ASA SSL VPN Appliances is a type of network security device that allows remote users to access a private…