Modern pentesting approaches use independent security researchers working under strict NDAs and advanced software platforms to streamline the process. However,…
Atlassian fixed six high-severity bugs in Confluence Data Center and Server Pierluigi Paganini June 20, 2024 Australian software company Atlassian…
A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named ‘Reptile’ and ‘Medusa’ to remain hidden on…
A recent KYC (Know Your Customer) data exposure at Total Fitness, a members-only club in the UK, left personal details…
Crown Equipment, a global top five forklift manufacturer, was hit by a cyberattack that has disrupted its manufacturing operations for…
Advances in technology are making it increasingly possible for retailers and hospitality companies to be more intelligent with their pricing…
Threat actors are actively exploiting a SolarWinds Serv-U path-traversal vulnerability, leveraging publicly available proof-of-concept (PoC) exploits. Although the attacks do…
In a concerning development for cybersecurity, hackers are increasingly leveraging Progressive Web Apps (PWAs) to execute sophisticated phishing attacks aimed…
Have you ever heard of a Doctrine meant to formulate cyber space operations? Well, here’s a news piece that might…
Jun 20, 2024NewsroomCyber Espionage / Hacking News State-sponsored actors with ties to Russia have been linked to targeted cyber attacks…
Researchers have discovered that various threat actors groups associated with Chinese state-linked espionage have been conducting a sustained hacking campaign…
China-linked spies target Asian Telcos since at least 2021 Pierluigi Paganini June 20, 2024 A China-linked cyber espionage group has…











