Video Surveillance Camera Vulnerability to Disable Alarms
Pablo Martínez, a member of the Red Team at cybersecurity firm Entelgy Innotec Security, has uncovered significant vulnerabilities in low-cost video surveillance cameras available for…
Pablo Martínez, a member of the Red Team at cybersecurity firm Entelgy Innotec Security, has uncovered significant vulnerabilities in low-cost video surveillance cameras available for…
Two new vulnerabilities have been discovered in the widely used Curl tool. These two vulnerabilities are identified as CVE-2023-38545 and CVE-2023-38546. One of these vulnerabilities…
Threat actors have been laundering currencies with multiple methods. One of the most predominant ways they have been using lately was the Cross-chain crime. In…
The Trojan War’s famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes harm when opened. HUMAN’s Satori…
Qakbot’s infrastructure and cryptocurrency assets were seized by government authorities in an operation in August 2023 with the assistance of international allies, raising concerns about…
A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with a Taiwan Semiconductor Manufacturing (TSMC)…
Storm-0324, a financially driven threat actor group, was detected delivering phishing messages using Microsoft Teams. In the past, it has been accused of disseminating phishing…
In a recent joint effort to bolster national cybersecurity, the National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have unveiled their…
In today’s REST API-driven landscape, most APIs are REST-based and widely utilized by web applications. These APIs are like versatile tools for sending and receiving…
The widely adopted Atlassian Confluence has been discovered with a zero-day vulnerability, which could allow threat actors to create an admin account on the Confluence…
A recently discovered vulnerability in Microsoft Office Word has raised concerns over the security of the popular productivity suite. This security flaw, classified as a…
Wireshark, formerly known as Ethereal, is a widely used, free, and open-source network protocol analyzer that allows users to capture and inspect data packets on…