JsOutProx Malware Abusing GitLab To Attack Financial Institutions
GitLab is a prominent web-based Git repository manager that is exploited by hackers to gain unauthorized access to confidential source...
Read more →GitLab is a prominent web-based Git repository manager that is exploited by hackers to gain unauthorized access to confidential source...
Read more →Welcome to the Cyber Security News Weekly Round-Up. Each week, we will explore the latest cyber threats, vulnerabilities, and notable...
Read more →Hackers have manipulated a popular Notepad++ plugin, injecting malicious code that compromises users’ systems upon execution. The AhnLab Security Intelligence...
Read more →Due to their high level of trust and popularity, hackers frequently use weaponized PDF files as attack vectors. Even PDFs...
Read more →A sophisticated vulnerability within the Magento ecommerce platform has been unveiled, posing a significant threat to online merchants and shoppers...
Read more →Cybersecurity firm Mandiant has uncovered a series of sophisticated cyberattacks targeting Ivanti Connect Secure VPN appliances. These attacks, attributed to...
Read more →HOYA CORPORATION, the world’s second-largest lens manufacturer, has reported an IT system incident that has disrupted its operations. The Tokyo-based...
Read more →The Pixel Update Bulletin details security vulnerabilities and functional improvements for supported devices. Updating to the April 2024 security patch...
Read more →A fake e-shop scam campaign has been targeting Southeast Asia since 2021, as CRIL observed a surge in activity in...
Read more →Multiple security flaws affecting VMware SD-WAN have been addressed, allowing arbitrary commands to be executed on the intended system. If...
Read more →Center Identity, a pioneering cybersecurity company, is excited to unveil its patented secret location authentication, reshaping how businesses manage workforce...
Read more →Security researcher Bartek Nowotarski disclosed a new class of vulnerabilities within the HTTP/2 protocol, known as the HTTP/2 CONTINUATION Flood....
Read more →