New DLL Hijacking Technique-Attackers Bypass Windows Security
DLL hijacking is a technique where a malicious DLL (Dynamic Link Library) is placed in a directory that a vulnerable...
Read more →DLL hijacking is a technique where a malicious DLL (Dynamic Link Library) is placed in a directory that a vulnerable...
Read more →Google Kubernetes Engine (GEK) has been detected with two flaws that a threat actor can utilize to create significant damage...
Read more →Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:- The rise of the...
Read more →Hackers abuse the ChatGPT name for malicious domains to exploit the credibility associated with the ChatGPT model, deceiving users into...
Read more →While the world celebrated Christmas, the cybercrime underworld feasted on a different kind of treat: the release of Meduza 2.2,...
Read more →Hackers exploit Zero-Days because these vulnerabilities are unknown to software developers, making them valuable for launching attacks before developing patches. ...
Read more →Barracuda Email Security Gateway (ESG) Appliance has been discovered with an Arbitrary code Execution vulnerability exploited by a China Nexus...
Read more →A new vulnerability has been discovered in Apache OfBiz, an open-source Enterprise Resource Planning (ERP) system. Apache OfBiz is used...
Read more →The cybersecurity domain is undergoing rapid changes owing to the rise in frequency and complexity of cyber threats. As the...
Read more →Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been...
Read more →Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating...
Read more →Hackers use weaponized Word documents to deliver malicious payloads through social engineering. By embedding malware or exploiting vulnerabilities in these...
Read more →