Kali Linux 2023.1 Released – What’s New!
A new distribution called “Kali Purple” was released recently by Offensive Security as part of the Kali Linux 2023.1 project for its 10th anniversary, and…
A new distribution called “Kali Purple” was released recently by Offensive Security as part of the Kali Linux 2023.1 project for its 10th anniversary, and…
Recently, the cybersecurity researchers at eSentire have identified a shady piece of malware downloader, BatLoader, that has been engaged in a wicked campaign of exploiting…
ChatGPt is the recent development in commercial AI technology developed by OpenAI, it was launched in November 2022. Since its launch, the tool gained over…
Attackers Offering Fake Malware Analysis Job Offers Targeting Security Researchers” title=”Attackers Offering Fake Malware Analysis Job Offers Targeting Security Researchers“/> Mandiant security researchers have recently…
Companies that have financial resources to allocate toward cybersecurity are hacked every day. In January, there was a Royal Mail ransomware attack that halted international…
Federal investigators in Los Angeles confiscated an internet site used to sell computer malware used by hackers to grab control of affected systems and steal a…
ASEC (AhnLab Security Emergency response Center) has recently reported that in order to deploy PlugX malware, threat actors are exploiting vulnerabilities in Chinese remote desktop…
The Flashpoint Vulnerability Research team observed that Bitwarden, a well-known password manager browser extension, treated embedded iframes on web pages in an unusual way. Insecure…
One of LastPass’s engineer neglected to update Plex on their personal computer, which led to the company’s significant breach. Plex claims that the vulnerability is…
Acer, a global Taiwanese company that makes hardware and electronics, has admitted that one of its servers was compromised. Attackers broke into document servers used…
Malicious actors have been around since the creation of the internet. The need to up your cybersecurity plan became a new reality In the aftermath…
Beware! Hackers Abusing Public Cloud Infrastructure to Host DBatLoader Malware” title=”Beware! Hackers Abusing Public Cloud Infrastructure to Host DBatLoader Malware“/> Recently, several phishing campaigns have…