Hackers Using Secure USB Drives to Attack Government Entities
An ongoing attack on government agencies in the APAC region has been claimed to have compromised a secure USB device...
Read more →An ongoing attack on government agencies in the APAC region has been claimed to have compromised a secure USB device...
Read more →Multiple vulnerabilities were detected in the SonicOS Management web interface and the SSLVPN portal, resulting in a firewall crash. In...
Read more →Synology DiskStation Manager (DSM) powers Synology NAS systems, offering remote file access and management. The DSM OS includes two default...
Read more →Malware distribution methods have changed significantly in the cyber threat landscape. Data analysis shows that Microsoft Office document files are...
Read more →Cybercriminals are known to exploit malicious advertising techniques for targeting the widely-used Notepad++ text editor for Windows. This could lead...
Read more →TeamViewer’s popularity and remote access capabilities make it an attractive target for those seeking to compromise systems for their gain....
Read more →A new campaign has been discovered that uses XorDDoS Trojan, which affects Linux systems and devices, turning them into zombies...
Read more →In the continuing Israel-Palestine conflict, there has been a noticeable rise in hacktivist groups who are planning an unending attack...
Read more →Discord has become a household name in online gaming and digital communication. Gamers, friends, and families flock to this platform...
Read more →AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the...
Read more →In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world,...
Read more →Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration Tools. This method allowed...
Read more →