North Korean Hackers Attacking Developers With A Weaponized JavaScript Projects
North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages. It...
Read more →North Korean threat actors target software developers with weaponized Javascript projects that include BeaverTail malware deployed via NPM packages. It...
Read more →A critical security flaw has been discovered in Zabbix, the popular open-source monitoring solution, potentially allowing attackers to gain full...
Read more →Hewlett Packard Enterprise (HPE) has disclosed multiple high-severity vulnerabilities in its Insight Remote Support (IRS) software, potentially allowing attackers to...
Read more →A new and dangerous malware campaign known as PixPirate has been targeting users in recent months, primarily in Brazil and...
Read more →China’s cyber threat landscape has evolved into a complex ecosystem involving state actors, private companies, and academic institutions. This intricate...
Read more →Microsoft has re-released the November 2024 Security Updates (SUs) for Exchange Server, addressing a critical issue that caused transport rules...
Read more →A critical vulnerability has been discovered in Kemp’s LoadMaster Load Balancer, allowing for full system compromise through a command injection...
Read more →A critical security flaw in Windows 11 has been discovered, allowing attackers to gain elevated system privileges through an integer...
Read more →T-Mobile revealed how it successfully blocked attempts by the Chinese hacking group Salt Typhoon to infiltrate its network. This announcement...
Read more →Since 2023, the Chinese APT group Earth Estries (aka Salt Typhoon, FamousSparrow, GhostEmperor, and UNC2286) has mostly targeted government agencies...
Read more →In a new study released today, researchers have demonstrated the significant potential of artificial intelligence (AI) in enhancing ethical hacking...
Read more →Elpaco ransomware, a Mimic variation, has been identified where attackers were able to connect via RDP to the victim’s server...
Read more →