Akira Ransomware Expands to Linux with In-built Tor Website
According to recent sources, threat actors have been working on a new variant of cross-platform ransomware that is named “Akira”. Akira was introduced to the…
According to recent sources, threat actors have been working on a new variant of cross-platform ransomware that is named “Akira”. Akira was introduced to the…
Data is a critical asset in today’s digital business landscape. The loss of crucial information can result in severe financial damages and harm to a…
The CRS v3.3.5 release has been announced by the OWASP ModSecurity Core Rule Set (CRS) team. The OWASP ModSecurity Core Rule Set (CRS) is a…
A new tool called FraudGPT has been launched by cybercriminals which pose a serious threat to both individuals and businesses. This black-hat-based tool is capable…
MikroTik RouterOS were vulnerable to a privilege escalation vulnerability which was first disclosed in June 2022 at REcon. The vulnerability existed on the x86 Virtual…
The CPUs that are based on x86-64 architecture feature XMM registers (128-bit), recently extended to 256-bit (YMM) and 512-bit (ZMM) for greater capacity. Beyond number…
Reports indicate that a Smishing campaign was conducted against Japanese Android users under the name of a Japanese Power and Water Infrastructure company. The SMS…
The CVE MITRE foundation has released the list of “On the Cusp” in which many of the CWEs (Common Weakness Enumerations) have increased as well…
A 24-year-old man named Amir Hossein Golshan from Downtown Los Angeles has pleaded guilty to hacking into Instagram users’ accounts and using a technique called…
The cloud-based IT management firm JumpCloud was compromised by North Korean Lazarus Group hackers who appear to be financially motivated to steal cryptocurrencies. Since at…
The China-linked threat actors who stole the US State Department and other Microsoft customer emails may have acquired access to apps other than Exchange Online…
Google is to start a pilot program to have employees work without internet access as a way to decrease the risk of cyberattacks. According to…