APC’s Easy UPS Online Monitoring Software is vulnerable to unauthenticated arbitrary remote code execution, allowing hackers to take over devices…
Threat actors frequently employ malicious Google Ads and SEO poisoning to spread malware. Recently, Secureworks’ Counter Threat Unit (CTU) researchers…
Apr 24, 2023Ravie LakshmananCyber Espionage The Russian-speaking threat actor behind a backdoor known as Tomiris is primarily focused on gathering…
The UK government is coming under pressure to publish the findings of a consultation into how the umbrella company market…
At Detectify, we made the decision early on to build a diverse team of individuals from different backgrounds, nationalities, and…
Twitter gold tick scam has been in the news lately for promoting a new kind of exploit on the platform. The…
Global median dwell time drops to just over two weeks, reflecting the essential role partnerships and the exchange of information…
Apr 24, 2023Ravie LakshmananServer Security / WordPress Threat actors have been observed leveraging a legitimate but outdated WordPress plugin to…
The notorious Royal Ransomware group has claimed the Lake Dallas Independent School District and the Clarke County Hospital, US, as…
When the Defense Industrial Base Vulnerability Disclosure Program (DIB-VDP) 12-month Pilot concluded, HackerOne sat down with the pilot’s collaborating agencies…
The ‘Decoy Dog’ malware toolkit, aimed at enterprises, was uncovered recently by the security analysts at Infoblox by analyzing 70…
Apr 24, 2023The Hacker NewsSaaS Security A recent review by Wing Security, a SaaS security company that analyzed the data…