Adobe, Cisco IOS, Skype, WordPad, & Rapid Reset Flaws
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are currently being actively exploited. This…
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are currently being actively exploited. This…
In recent times, we’ve witnessed a significant shift in the tactics employed by ransomware groups. Instead of solely infiltrating corporate networks to pilfer data and…
In September, two high-profile casino breaches taught us about the nuances of the RaaS affiliate landscape, the asymmetric dangers of phishing, and of two starkly…
My heart goes out to those facing violence, loss, and displacement. I hope there is a return to peace soon. In the meantime, I’ll try…
A newly discovered campaign dubbed “Stayin’ Alive” has been targeting government organizations and telecommunication service providers across Asia since 2021, using a wide variety of…
Threat actors target telecoms and government ministries because they house valuable data and infrastructure. Telecoms hold sensitive communication records and can disrupt essential services, while…
A malicious package hosted on the NuGet package manager for the .NET Framework has been found to deliver a remote access trojan called SeroXen RAT.…
A threat actor has deployed a WordPress backdoor that can hide its presence by posing as a legitimate plugin, WordPress security firm Defiant reports. Identified…
Apple has released iOS and iPadOS updates to patch a kernel vulnerability that has been exploited in attacks. The flaw, tracked as CVE-2023-42824, has been…
curl 8.4.0 has been released to patch and release details on a hyped up high-severity security vulnerability (CVE-2023-38546), easing week-long concerns regarding the flaw’s severity.…
In order to disrupt human-operated ransomware attacks and prevent attackers from advancing their objectives through lateral movement, it is crucial to swiftly contain any compromised…
A recent EMPACT hackathon, organized by Europol, gathered experts and law enforcement officers to develop tools for identifying and tracking human traffickers recruiting victims online.…