Deciphering the Economics of Software Development: An In-Depth Exploration
22
Apr
2024

Deciphering the Economics of Software Development: An In-Depth Exploration

The depth of activities within software development ranges from ideation and design to coding, testing, and deployment. The cost of…

Microsoft fixed two zero-day flaws exploited in malware attacks
22
Apr
2024

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities Pierluigi Paganini April 22, 2024 Researcher demonstrated how to exploit vulnerabilities…

ACDS Launches Revolutionary OBSERVATORY Solution: Redefining Attack Surface Management
22
Apr
2024

ACDS Launches Revolutionary OBSERVATORY Solution: Redefining Attack Surface Management

Advanced Cyber Defence Systems (ACDS) has unveiled its groundbreaking Attack Surface Management (ASM) solution: OBSERVATORY. Engineered with a comprehensive three-pronged…

Research Windows Defender Bypassed
22
Apr
2024

CrushFTP Servers Zero-day Under Active Attack : Update Now

CrushFTP is a file transfer server that supports secure protocols, offers easier configuration, and offers powerful monitoring tools. It also…

Rootkit-Like Powers
22
Apr
2024

Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers

Apr 22, 2024NewsroomRootkit / Software Security New research has found that the DOS-to-NT path conversion process could be exploited by…

Hackers Mimic Road Toll Collection Services to Steal Your Money
22
Apr
2024

Hackers Mimic Road Toll Collection Services to Steal Your Money

The FBI’s Internet Crime Complaint Center (IC3) has warned about a sophisticated smishing scam targeting drivers across multiple states. Since…

Researchers Claim that Windows Defender Can Be Bypassed
22
Apr
2024

Researchers Claim that Windows Defender Can Be Bypassed

Cybersecurity experts from SafeBreach have revealed a series of vulnerabilities that could allow attackers to remotely delete files on a…

week in security
22
Apr
2024

A week in security (April 15 – April 21)

April 18, 2024 – A major international law enforcement effort has disrupted the notorious LabHost phishing-as-a-service platform. April 18, 2024…

Hackers Offering Admin Access to 3000 Fortinet SSl-VPN
22
Apr
2024

Hackers Offering Admin Access to 3000 Fortinet SSl-VPN

Hackers are now offering administrative access to over 3000 Fortinet SSL-VPN devices. This breach poses a significant threat to the…

FIN7 Attacking IT Employees
22
Apr
2024

Apple Removes WhatsApp & Threads from its App Store for China

With the tightening grip of Chinese regulatory measures on foreign digital services, Apple Inc. has removed several major messaging apps,…

Citrix UberAgent Vulnerability Allows Attackers To Escalate Privileges
22
Apr
2024

Citrix UberAgent Vulnerability Allows Privilege Escalation

Citrix’s uberAgent, a sophisticated monitoring tool used to enhance performance and security across Citrix platforms, has been identified as having…

EASA Alerts Airlines Amid Suspected Cyber-Attacks on UK-Bound Flights
22
Apr
2024

EASA Alerts Airlines Amid Suspected Cyber-Attacks on UK-Bound Flights

European Union Aviation Safety Agency (EASA) has issued a cautionary alert following reports of cyber-attacks targeting flights bound for the…