PoC Exploit Code Released for Critical Papercut Flaw
Threat actors are actively taking advantage of critical vulnerabilities present in the PaperCut MF/NG print management software. This exploitation aims...
Read more →Threat actors are actively taking advantage of critical vulnerabilities present in the PaperCut MF/NG print management software. This exploitation aims...
Read more →Microsoft has initiated the naming taxonomy for threat actor groups. Over the years, threat actors have evolved massively, leading to...
Read more →The ‘Decoy Dog’ malware toolkit, aimed at enterprises, was uncovered recently by the security analysts at Infoblox by analyzing 70...
Read more →An Israeli cybersecurity company, Astrix’s Security Research Group, discovered a 0-day vulnerability in Google’s Cloud Platform (GCP) dubbed Ghosttoken on...
Read more →Single Sign-on is an authentication process that helps to log in to multiple applications using single login credentials. Security is...
Read more →Japanese cybersecurity experts warn that ChatGPT can be deceived by users who input a prompt to mimic developer mode, leading...
Read more →Recently, a new attack campaign has been discovered by the cybersecurity researchers at Aqua Security that exploits Kubernetes RBAC to...
Read more →Two new critical flaws have been found in Alibaba Cloud’s popular services, ApsaraDB and AnalyticDB. Both of them were in...
Read more →A new hacking tool, AuKill, disables Endpoint Detection & Response (EDR) software for threat actors to launch BYOD attacks by...
Read more →Researchers have recently found that the ICICI Bank systems misconfiguration caused data leakage, exposing more than 3.6 million customers’ sensitive...
Read more →ESET researchers have recently discovered that Linux users targeted with malware in the new “Operation DreamJob” Lazarus campaign for the...
Read more →A recent report from CISA (US Cybersecurity and Infrastructure Security Agency) revealed that the APT 28 group was responsible for...
Read more →