Hackers Actively Exploited Ivanti 0-Day to Execute Arbitrary Commands
Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass...
Read more →Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass...
Read more →AgentTesla is a notorious malware that functions as a keylogger and information stealer. By logging keystrokes and capturing screenshots on...
Read more →Hackers use the Mirai botnet to launch large-scale Distributed Denial of Service (DDoS) attacks by exploiting vulnerable Internet of Things...
Read more →AirDrop was introduced in iOS 7, which allows Apple users to transmit files between iOS and macOS systems. Moreover, this...
Read more →Adobe has released a security update that fixes “Important-severity” vulnerabilities in its Substance 3D Stager product. The successful exploitation of...
Read more →Pikabot is a loader malware that is active in spam campaigns and has been used by the threat group Water...
Read more →Hackers use YouTube channels to deliver malware due to the huge user base of the platform. By using YouTube channels,...
Read more →Qakbot is a sophisticated banking trojan and malware that primarily targets financial institutions. This sophisticated malware steals sensitive information such...
Read more →Cacti, the performance and fault management framework, has been discovered with a blind SQL injection vulnerability, which could reveal Cacti...
Read more →QNAP has released multiple security advisories for addressing several high, medium, and low-severity vulnerabilities in multiple products, including QTS, QuTS...
Read more →In recent years, we have seen a significant shift in the global workforce. With the proliferation of high-speed internet and...
Read more →Accenture, a global professional services company, has made a strategic move in the U.K. market by acquiring 6point6, a leading...
Read more →