Hackers often register new domains for phishing attacks, spreading malware, and other deceitful activities. Such domains are capable of pretending…
SocGholish malware, also known as FakeUpdates, has exhibited new behavior since July 4th, 2024, as the infection chain still begins…
Airlines often become the target of hackers as they contain sensitive personal and financial details of passengers as well as…
A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing are making it difficult for law…
An unauthenticated endpoint vulnerability allowed threat actors to identify phone numbers associated with Authy accounts, which was identified, and the…
Threat actors use RATs because they provide attackers with persistent access to compromised systems, enabling long-term espionage and exploitation. North…
The more efficient your core business operations, the more motivated and productive your employees and as a direct result, the…
Two critical vulnerabilities (CVE-2024-31204 and CVE-2024-30270) affecting Mailcow versions before 2024-04 allow attackers to execute arbitrary code on the server.…
Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data. ARM's Memory Tagging Extension (MTE) aims…
A new ransomware variant dubbed ‘Fog’ has been spotted targeting US businesses in the education and recreation sectors. Forensic data…