Researchers have identified a critical vulnerability in Shim, a widely-used Linux bootloader. This vulnerability could potentially allow attackers to execute…
A new Windows malware called Ov3r_Stealer is spreading through fake Facebook job ads, according to a report by Trustwave SpiderLabs.…
Experts have discovered a third Server Side Request Forgery (SSRF) vulnerability in Ivanti products. This is a serious security issue…
A new campaign named “Commando Cat” uses a Docker API vulnerability. It uses Docker to gain initial access to a…
On February 1, 2024, a post on a Darknet hacker forum selling Hewlett Packard Enterprise data appeared. Threat actor known…
It’s no secret that cybercriminals are increasingly using mobile platforms…
A previously unknown payload of ransomware, that call itself WannaCry…
Researchers detected fake company accounts on GitHub linked to a…
BreachForums, an infamous Darknet forum that was shut down in…
It became known that during the audit in the solution…
With increased remote work, IT teams use remote access tools…
Information security experts have published a PoC exploit for a…
Trend Micro researchers reported recently that since September 2022, attackers…
Fortinet, a well-known vendor of corporate-grade security solutions, issued an…
According to security researchers, the Clop ransomware group has been…
Android is an open operating system. This is an advantage…
Email scam actors constantly try to pick a better disguise…