Chrome
Chrome Vulnerability Let Attackers Execute Arbitrary Code Remotely
The stable channel for desktops has been updated to version 128.0.6613.119/.120 for Windows and Mac, and 128.0.6613.119 for Linux.This update will be gradually...
Cloud
CloudSOC – An OpenSource Project for SOC & Security Analysts
Security Operations Centers (SOCs) and security analysts are under immense pressure to stay ahead of potential attacks.Enter CloudSOC, an open-source project designed to...
CVE/vulnerability
BlackByte Hackers Exploiting VMware ESXi Auth Bypass Vulnerability
BlackByte, a Ransomware-as-a-Service (RaaS) group that surfaced about mid-2021 appears to have traces of Conti's evolution.It uses productive sophistication such as bypassing security measures...
cyber security
Iranian Threat Group Attack US Organization via Ransomware
Iranian cyber actors have been identified as the perpetrators behind ransomware attacks targeting U.S. organizations across multiple sectors.This revelation comes from a joint Cybersecurity...
cyber security
.NET-based Snake Keylogger Attack Windows Using Weaponized Excel Documents
Researchers uncovered a sophisticated phishing campaign that exploits a .NET-based Snake Keylogger variant.This attack leverages weaponized Excel documents to infiltrate Windows systems, posing...
Cyber Attack
Attackers Spread Lumma Stealer Malware GitHub Comments
Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware.This sophisticated threat is part of a growing trend where attackers use...
Cloud
Hackers Exploited Digital Advertising Tools to Launch Malicious Campaigns
Cybersecurity researchers from Mandiant and Google Cloud have uncovered a sophisticated scheme where hackers exploit digital advertising tools to conduct malicious campaigns.These tools, originally...
Chrome
Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Government Websites
Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites, particularly in Mongolia.Google's Threat Analysis Group (TAG) observed these...