Hackers are now using steganography techniques to distribute the notorious Remote Access Trojan (RAT) known as RemcosRAT. This method, which…
Researchers have brought to light a new attack method – dubbed TunnelVision and uniquely identified as CVE-2024-3661 – that can…
Hackers exploit the weaponized shortcut files due to their ability to execute malicious code without knowing the user being targeted….
By Claude Mandy, Chief Evangelist at Symmetry Systems Organizations depend on data to operate. From day-to-day operations to strategic decisions,…
A critical vulnerability in CrushFTP, identified as CVE-2024-4040, has been actively exploited in the wild. It allows attackers to perform…
08 May Backstory Of The World’s Second CISO Posted at 08:51h in Blogs by Di Freeze This week in cybersecurity…
MITRE has shared a timeline of the recent breach if fell victim to and has confirmed that it began earlier…
״Defenders think in lists, attackers think in graphs,” said John Lambert from Microsoft, distilling the fundamental difference in mindset between…
A new UPS management vulnerability in CyberPower Uninterrupted Power Supply (UPS) management software has been uncovered, revealing multiple flaws that have…
LiteSpeed Cache WordPress plugin actively exploited in the wild Pierluigi Paganini May 08, 2024 Threat actors are exploiting a high-severity…
A new group known as MorLock ransomware has intensified its attacks on Russian businesses, causing disruptions and financial losses. This…
CyberSmart, the UK’s leading provider of complete cyber confidence to UK SMEs has announced its partnership with Australian technology distributor,…











