Have you heard of the term HTTP Request Smuggling? What about HTTP/2 Downgrading? Well, these are vulnerabilities that can be…
Following an investigation into the unauthorized use and sale of geolocation data by two companies, the Federal Trade Commission (FTC)…
The FritzFrog cryptomining botnet has new potential for growth: a recently analyzed variant of the bot is exploiting the Log4Shell…
Feb 01, 2024NewsroomCryptojacking / Linux Security Exposed Docker API endpoints over the internet are under assault from a sophisticated cryptojacking…
The US government has succeeded in disrupting a botnet created by known Chinese threat actor Volt Typhoon that had paved…
CISA has ordered U.S. federal agencies to disconnect all Ivanti Connect Secure and Policy Secure VPN appliances vulnerable to multiple…
In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on…
The enemy is using cyber weapons that are hard to track and even harder to fully attribute to an adversary,…
Ripple CEO Brad Garlinghouse has also confirmed that the XRP wallet belonging to Ripple’s co-founder, Chris Larsen, was indeed hacked…
The FBI has disrupted the KV botnet, used by People’s Republic of China (PRC) state-sponsored hackers (aka “Volt Typhoon”) to…
The U.S. government on Wednesday said it took steps to neutralize a botnet comprising hundreds of U.S.-based small office and…
The Department for Environment, Food and Rural Affairs (Defra) has updated what it claims to be 180 critical legacy applications….











