Researchers have discovered that threat actors have been using open-source platforms and codes for several purposes, such as hosting C2…
The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host. The campaign employed…
In a significant blow to one of the most prolific ransomware operations, authorities from the U.S. and U.K., in collaboration…
SolarWinds has released their Access Rights Manager version 2023.2.3, in which several vulnerabilities associated with Deserialization and Directory Traversal leading…
Malware often targets Windows users due to the operating system's widespread popularity, making it a lucrative target for threat actors. …
Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying…
Outlook has been discovered to have an interesting vulnerability while handling specific hyperlinks, which was found to be exploited by…
While Artificial Intelligence holds immense potential for good, its power can also attract those with malicious intent. State-affiliated actors, with…
A new flaw has been discovered in DNSSEC, which, when exploited by threat actors, could result in the unavailability of…
Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…