Two new zero-day vulnerabilities have been discovered in Ivanti Connect Secure and Ivanti Policy Secure products that are assigned with…
The Grandoreiro, a criminal organization that uses banking malware to commit electronic banking fraud against Spain, Mexico, Brazil, and Argentina,…
Mercedes-Benz has been reported to have leaked its source code due to a GitHub token leak from an organization employee.…
The Trigona ransomware threat actor has been observed engaging in new activities, such as installing Mimic malware that targets MS-SQL…
Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data. In this…
Vladimir Dunaev, a resident of Amur Blast and aged 40, has confessed to creating and distributing Trickbot malware. The purpose…
In order to obtain unauthorized access and control, hackers take advantage of software vulnerabilities by manipulating updates. By corrupting the…
The digital landscape is under siege. Surging browser-based phishing attacks, a 198% increase in just the second half of 2023,…
Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account…
Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…