SEIKO Group Corporation (SGC) has announced that they suffered a cyber attack that exposed customer data. The attack lasted for…
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are…
Threat actors target telecoms and government ministries because they house valuable data and infrastructure. Telecoms hold sensitive communication records and…
Three new vulnerabilities have been discovered in Junos OS: password disclosure, MAC address validation bypass, and Time-of-check Time-of-use (TOCTOU) Race…
A command injection vulnerability has been discovered in the D-Link DAP-X1860 range extender, allowing threat actors to execute remote code…
The Trojan War's famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…
A cyber espionage campaign has been discovered in which threat actors use a variant of the HyperBro loader along with…
A growing cyber threat involving Dropbox has emerged, and it's raising concerns across the cybersecurity landscape. In the initial two…
Hackers frequently target Microsoft SQL servers because of their extensive use and possible weaknesses. These servers are a top target…
Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics. They leverage advanced technologies, use…