Microsoft Azure Services Vulnerability Let Attackers Gain Access
Orca recently conducted an investigation into several Microsoft Azure services and discovered four instances where various services were uncovered to...
Read more →Orca recently conducted an investigation into several Microsoft Azure services and discovered four instances where various services were uncovered to...
Read more →OAuth 2.0 is the industry-standard protocol for authorization. OAuth 2.0 supersedes the work done on the original OAuth protocol created...
Read more →Cyble Research & Intelligence Labs (CRIL) discovered a brand-new malware variant called “Rhadamanthys Stealer.” This malware stealer variation is now...
Read more →It has been reported that a group or individual, whose identity is currently unknown, has released a new “backdoor.” This...
Read more →The consumer VPN market has seen explosive growth in the last few years due to the increasing popularity of VPN...
Read more →Digital certificates are electronic credential that binds the identity to the owner of the certificate which can also pair the...
Read more →In a recent incident, within just 24 hours of initial access, the IcedID (aka BokBot) malware was used to successfully...
Read more →Kerberos authentication is a cryptography-based protocol that is used to secure logins. The Kerberos is a mythological three-headed Greek creature....
Read more →Twitter Inc. undertook a thorough investigation in response to recent media claims that the data of 200M Twitter users were...
Read more →An incident involving a cyber attack has caused severe service disruptions at Royal Mail, the British postal service and courier...
Read more →Trend Micro researchers recently reported that Australian healthcare entities were infected with a Cobalt Strike beacon after a new SEO...
Read more →The official AnyDesk website is being impersonated using more than 1,300 domains, all of which are linking to a Dropbox...
Read more →