Proton Mail Down – Services Recovered after a Massive Outage
Proton Mail, the renowned privacy-focused email service, experienced a significant global outage today, leaving users worldwide unable to access their...
Read more →Proton Mail, the renowned privacy-focused email service, experienced a significant global outage today, leaving users worldwide unable to access their...
Read more →The NonEuclid Remote Access Trojan (RAT), a highly sophisticated malware, has been detected, allowing unauthorized remote access via advanced evasion...
Read more →Imagine an employee receiving an email that looks completely legitimate, maybe it’s a fake invoice or a shipping update. They...
Read more →As you probably know by now, it doesn’t really matter how big in size your business is, you’re going to...
Read more →Criminal IP, a globally recognized Cyber Threat Intelligence (CTI) solution by AI SPERA, has launched its Criminal IP Malicious Link Detector add-in...
Read more →The researchers exploited a novel attack vector by hijacking abandoned backdoors within other backdoors, which relied on expired or abandoned...
Read more →The Green Bay Packers organization has disclosed a data breach affecting thousands of customers who made purchases on their official...
Read more →Attackers have evolved a sophisticated social engineering scheme to target Middle Eastern banking consumers by posing as government officials and...
Read more →A critical vulnerability in Kerio Control, a popular firewall and Unified Threat Management (UTM) product, has been discovered that could...
Read more →A proof-of-concept (PoC) exploit for the critical Apache Struts vulnerability, CVE-2024-53677, has been publicly released, raising alarm across the cybersecurity...
Read more →A proof-of-concept (PoC) exploit code for a critical vulnerability in macOS, identified as CVE-2024-54527 has been disclosed. This vulnerability allows...
Read more →Multiple vulnerabilities in Palo Alto Networks’ Expedition migration tool have been discovered, potentially exposing sensitive firewall credentials, including usernames, cleartext...
Read more →