iPhone Zero-Day Exploited in the Wild to Install Malware
Researchers discovered an actively exploited zero-click vulnerability that was part of an exploit chain aimed at deploying NSO Group’s Pegasus malware. One of the most…
Researchers discovered an actively exploited zero-click vulnerability that was part of an exploit chain aimed at deploying NSO Group’s Pegasus malware. One of the most…
Cisco addressed high-impact vulnerability CVE-2023-20243 in the Cisco Identity Services Engine (ISE), allowing attackers to stop processing Radius packets. This vulnerability, with a base score of…
FortiOS SSL-VPN safeguards against data breaches, while ManageEngine ServiceDesk Plus offers an integrated help desk and asset management for IT resources. At an Aeronautical Sector…
Check Point Software Technologies Ltd. (NASDAQ: CHKP), a global leader in cybersecurity solutions, has revealed its strategic move to acquire Atmosec, an innovative Software as…
Samsung Mobile has issued fixes to address several security flaws discovered in Galaxy phones and tablets. In the September 2023 security patch, 62 bugs were…
Dastardly is a powerful web vulnerability DAST (Dynamic Application Security Testing) scanner developed to assist organizations in effectively safeguarding their web applications. It is a free,…
A Critical 0-day vulnerability was discovered in AtlasVPN for Linux, which can disconnect the AtlasVPN and leak the user’s IP address. The AtlasVPN, running a…
A Privilege Escalation was recently discovered, which affects Windows’s File History service and can be used by threat actors to gain escalated privileges on a…
Recent reports indicate two vulnerabilities relating to information disclosure and remote code execution in MinIO, and their proof of concept was publicly disclosed. Threat actors…
Reflectiz, a cybersecurity company specializing in continuous web threat management, offers an exclusive, fully remote solution to battle Magecart web-skimming attacks, a popular cyberattack involving…
In the vast and complex world of cybersecurity, danger often hides in the most unsuspecting corners, stalking stealthily where our guard is least prepared. While…
AttackCrypt, an open-source “crypter,” was recently used by cybercriminals to hide malware binaries and avoid antivirus detection. A crypter is a kind of software that can encrypt,…