Hackers Abuse QEMU Hardware Emulator for C2 Communication
QEMU is an open-source platform that provides a secure and private virtualized space for trying out malicious codes, exploits, and...
Read more →QEMU is an open-source platform that provides a secure and private virtualized space for trying out malicious codes, exploits, and...
Read more →A critical vulnerability in OpenNMS, a widely used network monitoring solution, has been identified, allowing attackers to inject malicious JavaScript...
Read more →American Express has recently notified its customers of a data breach involving a third-party service provider, marking a security incident...
Read more →A prominent cybersecurity technology creator, has released its latest report, “Hi-Tech Crime Trends 2023/2024,” highlighting critical global cyber threats. The...
Read more →Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading...
Read more →A threat actor has been identified as creating fraudulent Skype, Google Meet, and Zoom websites to distribute malware, explicitly targeting...
Read more →Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding...
Read more →Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell....
Read more →In cybersecurity, the battle against malware is critical, akin to handling dangerous pathogens. The importance of secure environments for analyzing...
Read more →The Federal Bureau of Investigation (FBI) has successfully seized a website associated with the ALPHV BlackCat ransomware group. The seizure...
Read more →Threat actors use hacked domain control to host malicious content by leveraging legitimate domains to evade detection by security measures. ...
Read more →Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours...
Read more →