A cluster of malicious Python projects has been identified in PyPI, the official Python PyPI package repository, which targets both Windows…
Recently, there has been a rise in incidences of hackers using “Remote Administration Tools” to control the infected system and…
Web Application Security consists of a myriad of security controls that ensure that a web application: Functions as expected. Cannot…
The government has been advised to overturn all the convictions of the hundreds of subpostmasters wrongly accused in the Post…
Multiple vulnerabilities have been discovered in Dell’s PowerProtect, which were associated with SQL injection, cross-site scripting (XSS), privilege escalation, command…
In a recent turn of events, Ledger, a prominent hardware wallet provider, faced a security breach that sent shockwaves through…
ESET researchers analyzed a growing series of new OilRig downloaders that the group used in several campaigns throughout 2022 to…
As we approach the dawn of 2024, the intersection of sustainability and innovation within the IT sector demands a proactive…
A new threat actor has been discovered to be using SQL injection attacks to gain unauthorized access to organizations in…
Windows Defender is a built-in antivirus and anti-malware software developed by Microsoft for Windows operating systems. It provides real-time protection…
Idaho National Laboratory data breach impacted 45,047 individuals Pierluigi Paganini December 15, 2023 The Idaho National Laboratory (INL) announced that…
Data of over a million users of the crypto exchange GokuMarket exposed Pierluigi Paganini December 15, 2023 GokuMarket, a centralized…











