GHOSTPULSE Hides Within PNG File Pixel Structure To Evade Detections
The popularity of PNG files combined with their widespread use on the internet makes them an attractive vector for threat...
Read more →The popularity of PNG files combined with their widespread use on the internet makes them an attractive vector for threat...
Read more →Security researchers have uncovered a new phishing campaign targeting users of the popular open-source Roundcube webmail software. Unknown threat actors...
Read more →Hackers impersonated ESET, a prominent cybersecurity firm, to attack organizations with destructive wiper malware. The attack, which began on October...
Read more →A new AI tool named Vulnhuntr has been introduced, revolutionizing the way vulnerabilities are discovered in open-source projects. This innovative...
Read more →The Internet Archive has fallen victim to another cyberattack, marking the third major security incident in October 2024. On October...
Read more →Welcome to this week’s Cybersecurity Newsletter, bringing you the latest updates and insights from the world of cybersecurity. Stay informed...
Read more →Cisco, has launched an investigation into a potential cyber security incident and has taken its public DevHub portal offline as...
Read more →Bitdefender Total Security has been found vulnerable to Man-in-the-Middle (MITM) attacks due to improper certificate validation in its HTTPS scanning...
Read more →WebRTC (Web Real-Time Communication) is an open-source project that facilitates real-time audio, video, and data sharing directly between web browsers...
Read more →A critical vulnerability has been identified in SolarWinds Web Help Desk, potentially allowing attackers to execute remote code on affected...
Read more →Cisco has issued a critical security advisory concerning multiple vulnerabilities in its ATA 190 Series Analog Telephone Adapters. These vulnerabilities...
Read more →A critical vulnerability in F5 BIG-IP, a popular network traffic management and security solution tracked as CVE-2024-45844, allows authenticated attackers...
Read more →