Exploit Released for Cisco IOS XE Zero-day Vulnerability
Cisco was reported with a critical vulnerability last week, which has been actively exploited by threat actors in the wild. The vulnerability was assigned with…
Cisco was reported with a critical vulnerability last week, which has been actively exploited by threat actors in the wild. The vulnerability was assigned with…
Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage of the search engine’s advertising…
Aadhaar, the unique identification number issued to every Indian citizen, has recently made headlines for all the wrong reasons. There are alarming reports suggesting that…
Oct 31, 2023NewsroomCyber War / Malware The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has been attributed as behind an…
A threat actor is harvesting identity and access management (IAM) credentials from public GitHub repositories within five minutes of exposure, cybersecurity firm Palo Alto Networks…
WiHD leak exposes details of all torrent users Pierluigi Paganini October 31, 2023 World-in-HD (WiHD), a French private video torrent community, left an open instance…
An actor that security researchers call Prolific Puma has been providing link shortening services to cybercriminals for at least four years while keeping a sufficiently…
Today, Dragos Inc., cybersecurity for industrial controls systems (ICS)/operational technology (OT) environments specialists, have announced the expansion of its combined capabilities in partnership with Rockwell…
Exploitation of a recently patched critical vulnerability in F5’s BIG-IP product started less than five days after public disclosure and proof-of-concept (PoC) exploit code was…
A new NuGet typosquatting campaign pushes malicious packages that abuse Visual Studio’s MSBuild integration to execute code and install malware stealthily. NuGet is an open-source…
The Kopeechka service, which refers to “penny” in Russian, is a new tool criminals use to quickly and easily generate hundreds of fake social media…
Slow progress on gender diversity Getting this right remains a key issue because women are still woefully under-represented in the tech industry. This year’s Digital…