Category: CyberSecurityNews
With the growing trend of businesses transitioning their operations to cloud-based Software as a Service (SaaS) platforms, ensuring the security…
A recent discovery has highlighted a privilege escalation vulnerability within Cisco Unified Communications Products. This vulnerability was found during internal…
As per reports, VMware has been reported with two critical vulnerabilities that could allow threat actors to perform an authentication…
Although the use of peripheral devices has risen to unparalleled rates in the post-pandemic period, many organizations have failed to…
The FBI and the Justice Department have declared a global effort to disrupt and dismantle the Qakbot infrastructure, which is…
The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia’s Italian-American clans. This…
Threat actors adopt the highly invasive techniques of HTML smuggling to launch Nokoyawa ransomware despite being delivered through macro and…
Media and frequent innovative releases aggressively fuel the rapid industry rise of generative AI (Artificial Intelligence) ChatGPT. But, besides its…
A high-profile cyber attack targeted a prominent company, Kroll. This attack utilized a sophisticated technique known as “SIM swapping,” which allowed…
The popular language learning platform has come under scrutiny as a post on a hacker’s forum offers access to information…
You might discover hundreds of open doors if you scan your website for security vulnerabilities. Our AppSec research across 1400 websites protected…
The internet domains serve as a launchpad for threat actors to launch several cyber attacks. By exploiting the internet domains…