Enterprise Device Management With QR Codes
Corporate mobile devices have become essential to everyday tasks for employees, but this convenience also comes with security risks. The...
Read more →Corporate mobile devices have become essential to everyday tasks for employees, but this convenience also comes with security risks. The...
Read more →Kali Linux 2023.3 is now available, and it includes a variety of new packages and tools, as well as the...
Read more →A cyber attack group – GroundPeony, targeting the Taiwanese government, was discovered in March 2023; it used several tactics, such...
Read more →One of the renowned hospitals in Israel became the victim of a data breach, and patients were blackmailed with a...
Read more →Cyberattacks are becoming increasingly sophisticated, threatening organizations’ critical infrastructure and sensitive data more than ever. Core solutions such as SIEMs...
Read more →For a supply chain attack and to plant the Korplug backdoor (aka PlugX) on the systems of the targeted victims,...
Read more →Two Server-Side Request Forgery (SSRF) vulnerabilities were found in Apache Batik, which could allow a threat actor to access sensitive...
Read more →An unauthenticated critical API access vulnerability was found in the Ivanti Sentry interface, which could allow a threat actor to...
Read more →Researchers have identified a new Malware-as-a-Service (MaaS) operator called ‘EVLF DEV’ as being behind the creation of CypherRAT and CraxsRAT....
Read more →A blind XPath injection vulnerability was discovered in Apache Software Foundation Apache Ivy, which allows threat actors to exfiltrate data...
Read more →Multiple vulnerabilities have been discovered on Junos OS, which can be combined to execute a preAuth remote code execution vulnerability...
Read more →DotRunpeX is one of the new and stealthiest .NET injectors that employs the “Process Hollowing” method, through which this malware...
Read more →