Nov 10, 2023NewsroomCyber Attack / Threat Intelligence Cybersecurity researchers have discovered a stealthy backdoor named Effluence that’s deployed following the…
In a significant development, the creators of the well-known Infostealer group, Lumma, have reportedly made a groundbreaking discovery. They claim…
SysAid zero-day exploited by Clop ransomware group Pierluigi Paganini November 10, 2023 Microsoft spotted the exploitation of a SysAid zero-day…
Trusted Computing Group’s Trust Platform Module 2.0 reference library specification has been discovered with two buffer overflow vulnerabilities that threat…
Nov 10, 2023The Hacker NewsThreat Intelligence / SecOps There is a seemingly never-ending quest to find the right security tools…
Recently, two significant vulnerabilities related to memory corruption have been uncovered in the popular VLC media player. These vulnerabilities were…
PDF files are commonly used for their versatility, making them a prime target for malware delivery because they can embed…
Nov 10, 2023NewsroomCyber Attack / Cyber Threat A group with links to Iran targeted transportation, logistics, and technology sectors in…
Chess.com, a prominent online gaming platform catering to chess enthusiasts, has allegedly fallen victim to a significant data breach, resulting…
Cyber forensic tools play a crucial role in cyber investigations by helping investigators collect, analyze, and preserve digital evidence. These…
The new tool can be integrated straight into the backend of whatever platform it is working with. It then connects…
Hackers target Remote Desktop Protocol (RDP) via malware because it provides them with remote access to a victim’s computer or…