Network Security

Chinese Hackers Using Open Source Tools To Launch Cyber AttacksChinese Hackers Using Open Source Tools To Launch Cyber Attacks

Chinese Hackers Using Open Source Tools To Launch Cyber Attacks

Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a modified version of the open-source network…

7 months ago
Researchers Details Attacks On Air-Gaps Computers To Steal DataResearchers Details Attacks On Air-Gaps Computers To Steal Data

Researchers Details Attacks On Air-Gaps Computers To Steal Data

The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which…

7 months ago
Versa Director Zero-day Vulnerability Let Attackers Upload Malicious FilesVersa Director Zero-day Vulnerability Let Attackers Upload Malicious Files

Versa Director Zero-day Vulnerability Let Attackers Upload Malicious Files

Versa Networks specializes in successful business. It offers Secure Access Service Edge (SASE), consolidating networking and security services in a…

7 months ago
Iranian APT42 Actors Conducting World Wide Surveillance OperationsIranian APT42 Actors Conducting World Wide Surveillance Operations

Iranian APT42 Actors Conducting World Wide Surveillance Operations

APT42 (aka Damselfly, UNC788, CALANQUE, Charming Kitten) is a sophisticated Iranian state-sponsored cyber espionage group.  This Advanced Persistent Threat (APT)…

8 months ago
Earth Baku Using Customized Tools To Maintain Persistence And Steal DataEarth Baku Using Customized Tools To Maintain Persistence And Steal Data

Earth Baku Using Customized Tools To Maintain Persistence And Steal Data

Earth Baku, an APT actor who initially focused on the Indo-Pacific region, has grown its activities extensively since late 2022.…

8 months ago
0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security

0.0.0.0 Day – 18 Yr Old Vulnerability Allow Attackers to Bypass All Browser Security

Threat actors often target and exploit security flaws in web browsers, as exploiting flaws in web browsers enables them to…

8 months ago
Voice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMSVoice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMS

Voice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMS

Users use Voice Over Wi-Fi (VoWiFi) quite frequently nowadays, as it's a technology that enables them to make voice calls…

8 months ago
Juniper SRX Vulnerability Allows Attackers Trigger DoS ConditionJuniper SRX Vulnerability Allows Attackers Trigger DoS Condition

Juniper SRX Vulnerability Allows Attackers Trigger DoS Condition

A vulnerability in Junos OS on SRX Series devices allows attackers to trigger a DoS attack by sending crafted valid…

9 months ago
New North Korean Actor Distributing Malicious npm Packages To Compromise OrganizationsNew North Korean Actor Distributing Malicious npm Packages To Compromise Organizations

New North Korean Actor Distributing Malicious npm Packages To Compromise Organizations

Early in 2024, North Korean threat actors persisted in using the public npm registry to disseminate malicious packages that were…

9 months ago
Stuxnet, The Malware That Propagates To Air-Gapped NetworksStuxnet, The Malware That Propagates To Air-Gapped Networks

Stuxnet, The Malware That Propagates To Air-Gapped Networks

Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA) systems used in industrial facilities. By…

10 months ago