AWS Will Begin Charging for the Use of Public IPv4 Addresses
IPv4 addresses have been on the verge of extinction ever since the last decade. The boom of IoT (Internet of...
Read more →IPv4 addresses have been on the verge of extinction ever since the last decade. The boom of IoT (Internet of...
Read more →Spywares are software that is used as a surveillance application to collect sensitive information from victims and send it to...
Read more →Trust Wallet made a significant announcement on November 14th, 2022, unveiling its newly launched browser extension for wide usage. The...
Read more →An Open-redirect vulnerability was discovered by IBM, which could allow threat actors to spoof the original URL of IBM Security...
Read more →This week’s Threat and Vulnerability Roundup is here! We at Cyber Writes take pride in delivering a weekly roundup of...
Read more →Using a vulnerability in MOVEit Transfer, hackers gained access to 8 to 11 million individuals’ ‘Users Data’ protected health information....
Read more →Recent reports indicate that Metabase has been discovered with an unauthenticated Remote Code Execution (RCE) vulnerability that lets threat actors...
Read more →Google has announced an alerting and manual scanning mechanism which can be used to find unknown tracker alerts. This feature...
Read more →AMD Zenbleed 2 processors were found vulnerable to use-after-free flaws, enabling data theft. While the exploitation of this flaw demands...
Read more →Trustwave’s open-source Web Application Firewall (WAF) engine, ModSecurity, faces DoS risk due to four transformation actions vulnerability. Cybersecurity researchers at...
Read more →Malware authors persistently seek novel approaches to exploit unsuspecting users in the active cyber threat landscape. To easily locate all...
Read more →The purple fox malware has been active since 2018, adopting a new technique to deliver its payload through MS SQL...
Read more →