SonicWall Critical Flaws Let Attackers Bypass Authentication
SonicWall has recently published a security notice in which 15 vulnerabilities were fixed. CVEs for these vulnerabilities have been published, and patches for 4 Critical,…
SonicWall has recently published a security notice in which 15 vulnerabilities were fixed. CVEs for these vulnerabilities have been published, and patches for 4 Critical,…
Citrix has released security advisories for critical and high-severity vulnerabilities, which could allow threat actors to escalate their privileges if they have access to an…
Storm-0978, a threat actor, actively targeted European and North American defense and government entities in a phishing campaign. Exploiting CVE-2023-36884, the campaign used Word documents…
As per the research conducted by SentinelOne, a new risk has been identified, which affects the information security researchers as well as the infosec community.…
IP geolocation API services can do far more than serve website visitors in their local language and currency using IP lookup. They can also play…
The OWASP Zed Attack Proxy is a widely used tool for conducting web application penetration testing. It is free and open-source. ZAP functions as a…
During the initial half of 2023, a notable surge occurred in attacks exploiting infected USB drives for secret theft. While the USB-based operation campaigns caused…
Cryptocurrency’s rising fame and diverse storage methods expand the arsenal of tools used by threat actors chasing digital assets and funds. The threat actors adapt…
New Rapid Security Response (RSR) patches from Apple have been released to address a new zero-day defect that has been used in attacks and affects…
One of the best methods for finding potential security gaps in your company’s cybersecurity design is a vulnerability assessment. You risk losing sensitive information to…
“The Legion” is a Python-based software that has been crafted with the explicit intention of gathering credentials. Its propagation initially occurred via Telegram channels, where…
Rekoobe is a notorious backdoor that primarily targets Linux environments, and it’s actively exploited by the threat actors, mainly a Chinese threat group, APT31. This…