A Remote Hash Lookup Service To Identify Malware
Today marks a significant milestone for Malcat users with the release of version 0.9.6, introducing Kesakode, a remote hash lookup...
Read more →Today marks a significant milestone for Malcat users with the release of version 0.9.6, introducing Kesakode, a remote hash lookup...
Read more →A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software’s web-based management interface. This vulnerability could potentially...
Read more →Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting WooCommerce online stores to steal credit...
Read more →Google has released a patch for a zero-day exploit in its Chrome browser. The vulnerability, identified as CVE-2024-5274, involves a...
Read more →State-sponsored hackers recently exploited vulnerabilities in MITRE’s Networked Experimentation, Research, and Virtualization Environment (NERVE). They used rogue virtual machines (VMs)...
Read more →Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users. These packages, found on the Python Package...
Read more →Hackers target military and government networks for varied reasons, primarily related to spying, which involves interference in the functioning of...
Read more →Zero Trust Maturity measures the extent to which an organization has adopted and implemented the Zero Trust security model. It...
Read more →The scalability and flexibility of cloud platforms recently boosted the emerging trend of cryptomining attacks in the cloud. Unlike on-premises...
Read more →In multiple aggressive phishing attempts, the financially motivated organization UAC-0006 heavily targeted Ukraine, utilizing ZIP and RAR attachments to distribute...
Read more →Gift cards are attractive to hackers since they provide quick monetization for stolen data or compromised systems. Reselling gift cards...
Read more →A new practical and powerful Denial of service attack has been discovered that exploits DNS queries and responses. This new...
Read more →