Chinese Hackers Attacking Industries using Cobalt Strike beacon
A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with a Taiwan Semiconductor Manufacturing (TSMC)…
A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with a Taiwan Semiconductor Manufacturing (TSMC)…
Storm-0324, a financially driven threat actor group, was detected delivering phishing messages using Microsoft Teams. In the past, it has been accused of disseminating phishing…
In a recent joint effort to bolster national cybersecurity, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have unveiled their…
In today’s REST API-driven landscape, most APIs are REST-based and widely utilized by web applications. These APIs are like versatile tools for sending and receiving…
The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an admin account on the Confluence…
A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite. This security flaw, classified as a…
Wireshark, formerly known as Ethereal, is a widely used, free, and open-source network protocol analyzer that allows users to capture and inspect data packets on…
Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics. They leverage advanced technologies, use social engineering techniques, and collaborate…
ShellTorch Serve is an open-source model-serving library developed by PyTorch that simplifies the deployment of machine learning models for inference in production environments. It provides…
A buffer overflow issue has been disclosed in the GNU C Library’s dynamic loader ld.so, which might allow local attackers to acquire root privileges on…
A growing cyber threat involving Dropbox has emerged, and it’s raising concerns across the cybersecurity landscape. In the initial two weeks of September, a staggering…
Hackers frequently target Microsoft SQL servers because of their extensive use and possible weaknesses. These servers are a top target for hackers looking to make…