Due to the widespread use and popularity of Windows and macOS, threat actors often target these platforms. Windows is a…
Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents…
A new malware variant is distributed by BlueNordoff APT group, a financially motivated threat group targeting cryptocurrency exchanges, venture capital…
Two high vulnerabilities have been discovered in VMware Tools, which were assigned with CVE-2023-34057 and CVE-2023-34058. These vulnerabilities were associated…
Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like…
The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across…
Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the…
Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information. This malware was…
One of the most dominating threats in the current cyberspace era is ransomware which is constantly affecting organizations of all…
By using email attachments that resemble regular documents, a variant of Dridex (aka Bugat and Cridex), which is a banking…