GL-AX1800 Router Vulnerability Let Attackers Execute Remote Code
A recent analysis of the GL-AX1800 router by researchers revealed the presence of several security vulnerabilities that attackers could exploit to gain remote access and…
A recent analysis of the GL-AX1800 router by researchers revealed the presence of several security vulnerabilities that attackers could exploit to gain remote access and…
LabHost group has been discovered to be targeting Canadian Banks with Phishing-as-a-service attacks. Phishing-as-a-service (PhaaS) groups have been on the rise due to multiple tools…
A company may lay off employees due to various reasons like changes in market conditions, shifts in business strategy, cost-cutting measures, and organizational restructuring to…
Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats to their organizations. And perhaps…
CISA (Cybersecurity and Infrastructure Security Agency) and MS-ISAC (Multi-State Information Sharing and Analysis Center) have jointly disclosed that an unknown organization has attacked a state…
The RansomHouse group recognized as a Ransomware-as-a-Service (RaaS), surfaced in the latter part of 2021 and has been actively utilizing ransomware variants to compromise corporate…
Security researchers Mathy Vanhoef and Héloïse Gollier, have recently uncovered several critical vulnerabilities in the Wi-Fi authentication protocols used in modern WPA2/3 networks collaborating with…
The .NET malware obfuscators are tools used to obfuscate the source code of .NET applications, making it challenging for reverse engineers to understand and analyze…
Zoom, a well-known video conferencing software, has patched seven vulnerabilities in its desktop and mobile applications, particularly a critical flaw identified as CVE-2024-24691 impacting Windows software. Notably,…
Wireshark, the most popular network protocol analyzer worldwide, has released version 4.2.3, which includes new features and upgrades. Wireshark, a well-known open-source network protocol analyzer,…
Threat actors hunt for ways to exploit vulnerabilities by employing tactics from technical zero-days to broad phishing. Social engineering blends with commodity malware on high-traffic…
Threat actors of Iranian origin, CharmingCypress (also known as Charming Kitten, APT42, TA453), have gathered political intelligence against international targets, with a special emphasis on…