Ferrari's woes seem to be continuing from F1 tracks to their data. And surprisingly, ransomware today encrypts files as fast…
Our lives are now enriched by the availability of LLMs that are easily accessible on the internet, so we have…
The Threat Analysis Group (TAG) of Google unveiled recently that commercial spyware vendors targeted Android and iOS devices using zero-day…
The Ecuadorian free-to-air television network Ecuavisa recently reported that a USB device was detonated inside an organization's newsroom. The explosion…
Researchers from Unit 42 have been monitoring a widespread campaign of harmful JavaScript (JS) injections. The campaign aims to redirect…
As a result of a joint effort of the CISA, FBI, and MS-ISAC, a public advisory was published recently. This…
When a DDoS attack is conducted, the server being targeted receives a large number of garbage requests. As a result,…
Lumen's Black Lotus Labs recently witnessed that Hackers are currently targeting DrayTek Vigor router models 2960 and 3900 in a…
In a recent analysis, MQsTTang, a newly designed custom backdoor, has been scrutinized by ESET researchers. After a thorough investigation,…