Category: CyberSecurityNews
In today’s age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of…
China’s Storm-0558 hacked 25 organizations, including government agencies, using fake tokens for email access, aiming at espionage since May 15,…
The latest research reveals a new sophisticated attack carried through Webapk technology targeting Android devices. The threat actors manipulate the…
Zimbra is a widely used email client used by many organizations worldwide. The Zimbra Collaboration Suite provides a much more…
Generative AI technology is rapidly growing and advancing, driven by continuous research and development efforts. But, besides the growing advancements…
A critical severity vulnerability has been detected in the request authentication validation for the REST API of the Cisco SD-WAN…
Businesses face a myriad of information security risks that can be detrimental to their operations. Information security threats evolve rapidly,…
An unrecorded .NET Loader was identified during routine threat hunting that downloads, decrypts, and executes a wide range of malicious…
A china based APT actor accessed Microsoft 365 cloud environment and exfiltrated unclassified Exchange Online Outlook data from a small number…
Russia’s invasion of Ukraine on February 24, 2022, followed escalating cyber operations, categorized into six phases, by Russian troops amassed…
Recent reports from Team82 and Check Point Research (CPR) team state that there has been a major vulnerability in QuickBlox…
The significant plunge in cyber crimes shows a decent rise in legitimate services in the mid of this year, 2023….