School’s Back, Cyberattack – IT Security Guru
It’s a fact that all organisations are valuable targets for cybercriminals, no matter the size of the organisation. However, some sectors are targeted more than…
It’s a fact that all organisations are valuable targets for cybercriminals, no matter the size of the organisation. However, some sectors are targeted more than…
Sep 06, 2023THNCyber Crime / Email Security A previously undocumented “phishing empire” has been linked to cyber attacks aimed at compromising Microsoft 365 business email…
As India prepares for the forthcoming G20 Summit 2023 in the nation’s capital, Delhi, this September, cybersecurity concerns are rising as hackers appear to set…
The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand. Blueshell backdoor…
Sep 06, 2023THNCyber Attack / Critical Infrastructure The Computer Emergency Response Team of Ukraine (CERT-UA) on Tuesday said it thwarted a cyber attack against an…
ASUS routers are affected by three critical remote code execution flaws Pierluigi Paganini September 06, 2023 Three critical remote code execution vulnerabilities in ASUS routers…
A Privilege Escalation was recently discovered, which affects Windows’s File History service and can be used by threat actors to gain escalated privileges on a…
The Indian Cyber Force (ICF) hackers group has claimed a series of precise cyber assaults on critical infrastructure in multiple nations, spanning Bangladesh, China, Pakistan,…
Recent reports indicate two vulnerabilities relating to information disclosure and remote code execution in MinIO, and their proof of concept was publicly disclosed. Threat actors…
In today’s digital age, where smartphones have become an integral part of our lives, cyber threats are constantly evolving. While email spam and phishing attacks…
MITRE Caldera for OT is now publicly available as an extension to the open-source Caldera platform, allowing security teams to run automated adversary emulation exercises…
Amid the growing interest from both companies and governments in transitioning to the cutting-edge fifth generation of wireless networks, commonly known as 5G, security experts…