Apple Safari JavaScriptCore Remote Code Execution Flaw Exploited in the Wild
A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting multiple versions of Apple Safari across...
Read more →A critical vulnerability identified as CVE-2024-44308 has been actively exploited in the wild, affecting multiple versions of Apple Safari across...
Read more →Researchers uncovered the resurgence of APT-C-01, also known as the Poison Ivy group, an advanced persistent threat organization notorious for...
Read more →Russian authorities have arrested Mikhail Matveev, a notorious Russian hacker linked to multiple ransomware attacks worldwide. Matveev, who was also...
Read more →In a presentation at the POC 2024 conference, cybersecurity expert Andrey Konovalov revealed a novel method for covertly disabling the...
Read more →Uniswap Labs has launched a $15.5 million bug bounty program to ensure the security of its latest protocol, Uniswap v4....
Read more →A publicly exposed database has left the sensitive information of hundreds of thousands of individuals vulnerable to potential misuse. Not...
Read more →Wirral University Teaching Hospital in the UK has been hit by a targeted cyberattack, leading to the declaration of a...
Read more →Zyxel has announced awareness of active exploitation attempts by threat actors targeting their firewall products. This follows a detailed report...
Read more →APT-C-60 launched a phishing attack in August 2024, targeting domestic organizations with malicious emails disguised as job applications. These emails,...
Read more →Helldown Ransomware, a sophisticated cyber threat, actively targets critical industries worldwide by leveraging advanced cross-platform capabilities, including Windows and Linux,...
Read more →UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often...
Read more →Protect Websites & APIs from Malware Attack Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations,...
Read more →