Hackers Abuse Discord to Blend Within Organizations’ Network
Discord has become a household name in online gaming and digital communication. Gamers, friends, and families flock to this platform...
Read more →Discord has become a household name in online gaming and digital communication. Gamers, friends, and families flock to this platform...
Read more →AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the...
Read more →In an ever-changing digital landscape, robust security measures are paramount. As Windows adapts to meet the evolving demands of our world,...
Read more →Cybercriminals behind the AvosLocker ransomware attack employed a tactic of infecting organizations through Open-Source Remote Administration Tools. This method allowed...
Read more →GitOps is a methodology that uses Git (or other version control systems) to store all aspects of a project’s infrastructure,...
Read more →A new phishing attack has been discovered, which uses malicious archive files to exploit the recently found WinRAR vulnerability CVE-2023-38831...
Read more →The ever-evolving world of cybercrime has given birth to a disturbing phenomenon – Phishing-as-a-Service (PhaaS), and one name that sends...
Read more →ToddyCat, a highly skilled advanced persistent threat (APT) actor notorious for launching targeted attacks in Europe and Asia, has recently...
Read more →The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are...
Read more →Threat actors target telecoms and government ministries because they house valuable data and infrastructure. Telecoms hold sensitive communication records and...
Read more →Three new vulnerabilities have been discovered in Junos OS: password disclosure, MAC address validation bypass, and Time-of-check Time-of-use (TOCTOU) Race...
Read more →The latest stable version of Google Chrome (version 118.0.5993.70) has been released for Mac and Linux. In contrast, the Windows...
Read more →