CitrixBleed vulnerability exploited by a ransomware gang
At the end of October, AssetNote released a proof-of-concept for the CVE-2023–4966 associated with sensitive information disclosure for Citrix Netscaler...
Read more →At the end of October, AssetNote released a proof-of-concept for the CVE-2023–4966 associated with sensitive information disclosure for Citrix Netscaler...
Read more →The NuGet package manager, which .NET developers widely use, has been under attack by a series of malicious activities, according...
Read more →Atlassian has been reported with a critical vulnerability in their Confluence Software, which several organizations have widely adopted. The CVE...
Read more →Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage...
Read more →A young man from Orlando, Florida, has been handed a 30-month prison sentence for his role in a cybercrime scheme...
Read more →Proofpoint, an enterprise security company, has entered into a definitive agreement to acquire Tessian, a leading provider of email security...
Read more →ServiceNow has been alerted to a potential misconfiguration concern that might impact the security of its platform. The company is...
Read more →Role-Based Access Control (RBAC) is a security paradigm focused on assigning system access to users based on their organizational role....
Read more →AhnLab Security Emergency Response Center (ASEC) has recently revealed a disturbing case of Remcos RAT, a malicious software that can...
Read more →F-Secure has recently implemented organizational changes in order to pursue strategic growth initiatives and meet its financial targets. These changes...
Read more →A new OAuth vulnerability has been discovered in three of the major extensions such as Grammarly, Vidio, and Bukalapak. These...
Read more →XWorm is a RAT (Remote Access Trojan), a malware-as-a-service. It was first discovered in July 2022 and is known to...
Read more →