Hackers Use Weaponized LNK Files
Threat actors have shifted from using malicious macros to malicious LNK files for initial access. This is due to Microsoft’s...
Read more →Threat actors have shifted from using malicious macros to malicious LNK files for initial access. This is due to Microsoft’s...
Read more →In a concerning turn of events, the Edmonds School District has once again fallen victim to a cyber attack. The...
Read more →A newly discovered XWorm malware variant poses a significant risk to Windows operating systems. This malicious software possesses many capabilities,...
Read more →With the rapid evolution of technology, the threat actors, along with their attacks, are also getting more sophisticated and evolving...
Read more →The recent discovery of a zero-day vulnerability (CVE-2023-2868) in Barracuda Networks Email Security Gateway (ESG) appliances has brought significant concern. ...
Read more →The notorious NoEscape ransomware group has recently targeted an institution of vital importance – the Oswaldo Cruz Foundation, commonly known...
Read more →It has recently come to light that the individuals responsible for the development and distribution of the infamous Raccoon Stealer...
Read more →There has been a cyber attack on two cloud hosting providers, namely CloudNordic and Azero Cloud, which Certiqa Holding owns....
Read more →According to Cisco Talos, the Lazarus Group, backed by North Korea, is actively attacking the backbone infrastructure of the internet...
Read more →A high-severity vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software might allow an unauthenticated local attacker to...
Read more →Aug 26, 2023THNData Breach / SIM Swapping Risk and financial advisory solutions provider Kroll on Friday disclosed that one of...
Read more →We take a look at reports that a smart lightbulb and app vulnerability could potentially put your Wi-Fi password at...
Read more →