ProxyShellMiner is being distributed to Windows endpoints by a very elusive malware operation, according to Morphisec. To generate income for…
Mandiant recently reported that a group of hackers originating from China utilized a vulnerability within FortiOS SSL-VPN that had only…
While using web browsers, there are security threats that, if not careful, can allow cybercriminals to take over the browser…
One of the two security flaws targeted by ProxyNotShell exploits, CVE-2022-41082 RCE vulnerability, has not been patched on more than…
The Google Home smart speaker was hacked recently by a security analyst (Matt Kunze) who found that there is a…
The Threat Research Unit at Qualys’ has revealed how a new Linux flaw tracked as (CVE-2022-3328), may be combined with…
Experts from Rapid7 observed a customized CentOS installation operating on F5 BIG-IP and BIG-IQ devices found to have various vulnerabilities. …
JsRat is python based script developed to backdoor victim machine using JavaScript payloads and the HTTP protocol for communication between the…
We all know that vulnerability assessment is very important nowadays, and that's why most of the companies use this assessment.…
Cisco released security updates for 2 severe vulnerabilities that affected Cisco wireless VPN, Firewall and Cisco Webex Meetings Desktop App.…