Hacktivists Rally On Telegram For Pavel’s Release
The events surrounding Pavel Durov’s arrest on 24 August 2024 due to Telegram’s suspected operational crimes worsened discussions on topics...
Read more →The events surrounding Pavel Durov’s arrest on 24 August 2024 due to Telegram’s suspected operational crimes worsened discussions on topics...
Read more →Researchers discovered that a malicious Chrome extension dubbed “Bull Checker” had been targeting people on multiple Solana-related subreddits. The Jupiter...
Read more →In a detailed continuation of the Linux Detection Engineering series, Elastic Security’s Ruben Groenewoud has released an in-depth exploration of...
Read more →Mandiant has discovered one of the unusual Iranian counterintelligence activities that focuses on prospective agents of foreign intelligence services, especially...
Read more →A critical vulnerability has been identified in Jenkins, a widely used automation server. If exploited further, this vulnerability allows attackers...
Read more →Access Control Lists (ACLs) are fundamental to network security and management. They are critical in determining who or what can...
Read more →VirusTotal is an essential tool for cybersecurity professionals. It offers a comprehensive platform for analyzing files, URLs, domains, and IP...
Read more →The ever-evolving malware landscape is evolving at an alarming rate, as a multitude of new strains have already been noticed....
Read more →Google’s Threat Analysis Group (TAG) has reported the discovery of multiple exploit campaigns targeting Mongolian government websites, spanning from November...
Read more →Researchers from Mandiant and Google have uncovered how cybercriminals are repurposing digital analytics and advertising tools to enhance their malicious...
Read more →A malicious AutoIT-compiled executable has been discovered that attempts to open Gmail login pages using popular browsers and possesses capabilities...
Read more →Ransomware-as-a-Service (RaaS) significantly lowers the technical barriers for threat actors to launch ransomware attacks, even it also enables threat actors...
Read more →