Category: CyberSecurityNews
Microsoft recently reported that CVE-2023-23397, a critical Outlook vulnerability, is currently being exploited in the wild by a Russian-state-sponsored threat…
Zoom, the popular video conferencing platform, has recently announced the launch of its Open-Source Vulnerability Impact Scoring System. This system…
In the labyrinth of cyber threats that define the digital landscape, 2023 has witnessed the resurgence of a particularly pernicious…
Imagine a bridge that connects diverse islands in a vast ocean – this is what virtual number services offer in…
Cybersecurity requires staying one step ahead. A main force of digital protection is eXtended Detection and Response (XDR). This means…
The Cyber-Extortion Trinity—the BianLian, White Rabbit, and Mario ransomware gangs—was observed by researchers working together to launch a joint extortion…
Hackers exploit QNAP devices because they often have known vulnerabilities or misconfigurations that can be exploited for unauthorized access. Besides…
MongoDB has experienced a security incident in which unauthorized access to its corporate systems was identified. However, the company confirmed…
In the intricate tapestry of the cyber landscape, Shakeeb Ahmed’s saga transcends the ordinary, featuring a downfall unparalleled in its…
Hackers are taking advantage of a Critical Apache Struts Bug’s initial activity with limited IP addresses engaged in exploitation attempts….
Threat actors make use of fast-evolving multi-layer malware for their complexity and sophistication, as they offer the ability to rapidly…
A cluster of malicious Python projects has been identified in PyPI, the official Python PyPI package repository, which targets both Windows…











