Massive DDoS Attack Leveraged Zero-Day in HTTP/2 Rapid Reset
Multiple Google services and Cloud users were allegedly the target of a unique HTTP/2-based DDoS attack. The attack used a cutting-edge method...
Read more →Multiple Google services and Cloud users were allegedly the target of a unique HTTP/2-based DDoS attack. The attack used a cutting-edge method...
Read more →Microsoft has published its October security patches in which over 100 vulnerabilities were fixed in multiple Microsoft products, including Windows...
Read more →Protecting personal data is a growing concern, with local storage as the last line of defense. Even here, precautions are...
Read more →A command injection vulnerability has been discovered in the D-Link DAP-X1860 range extender, allowing threat actors to execute remote code...
Read more →Your perceived reality can differ from the .NET code you observe in debuggers like dnSpy, raising questions about its behavior...
Read more →The latest version of Cobalt Strike 4.9 is now available. This release includes improvements to Cobalt Strike’s post-exploitation capabilities, including...
Read more →In September 2023, FortiGuard Labs’ vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign. This campaign, known...
Read more →A new zero-day vulnerability has been discovered in Apple’s macOS systems, which allows threat actors to execute code on behalf...
Read more →Pablo Martínez, a member of the Red Team at cybersecurity firm Entelgy Innotec Security, has uncovered significant vulnerabilities in low-cost...
Read more →Two new vulnerabilities have been discovered in the widely used Curl tool. These two vulnerabilities are identified as CVE-2023-38545 and...
Read more →Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately...
Read more →The Trojan War’s famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes...
Read more →