Post-Exploitation Technique After Hacking Ivanti, Fortigate VPN Servers
Akamai researchers have delved into the often-overlooked threat of VPN post-exploitation, highlighting techniques that threat actors can use to escalate...
Read more →Akamai researchers have delved into the often-overlooked threat of VPN post-exploitation, highlighting techniques that threat actors can use to escalate...
Read more →A Sinkclose vulnerability, which has been detected in AMD processors for decades, lets hackers obtain access to some of the...
Read more →A newly discovered vulnerability in the Common Log File System (CLFS.sys) driver of Windows has been identified, potentially affecting millions...
Read more →Hackers masquerading as the Security Service of Ukraine have compromised over 100 government systems. The Computer Emergency Response Team of...
Read more →Criminal IP, an expanding Cyber Threat Intelligence (CTI) search engine from AI SPERA, has recently completed its technology integration with...
Read more →IBM has disclosed a vulnerability in its Aspera Shares software, CVE-2023-38018. This flaw in user session handling could potentially allow...
Read more →Researchers have uncovered a sophisticated phishing marketplace, the ONNX Store, which provides cybercriminals with advanced tools to hijack Microsoft 365...
Read more →In the beginning of August 2024, Sonos released a security advisory in which they fixed two security vulnerabilities that were...
Read more →The threat landscape is significantly evolving, and cybersecurity researchers are continuously developing new security mechanisms to mitigate such evolving and...
Read more →Security researchers have uncovered severe vulnerabilities in the Ewon Cosy+, a widely used industrial remote access gateway tool, allowing them...
Read more →The Sumter County Sheriff’s Office has been victim to a ransomware attack orchestrated by the criminal group Rhysida. The cyberattack...
Read more →Cybersecurity researchers have discovered an extensive hacker toolkit, revealing a comprehensive set of tools designed for various stages of cyberattacks....
Read more →