computer security

Ivanti discloses 2 New zero-days, one already under exploitation

Two new zero-day vulnerabilities have been discovered in Ivanti Connect Secure and Ivanti Policy Secure products that are assigned with…

12 months ago

Grandoreiro Banking Malware Infrastructure Seized by Authorities

The Grandoreiro, a criminal organization that uses banking malware to commit electronic banking fraud against Spain, Mexico, Brazil, and Argentina,…

1 year ago

Mercedes-Benz Source Code Leaked via mishandled GitHub token

Mercedes-Benz has been reported to have leaked its source code due to a GitHub token leak from an organization employee.…

1 year ago

Hackers Hijacking MS-SQL Servers to Install Mimic Ransomware

The Trigona ransomware threat actor has been observed engaging in new activities, such as installing Mimic malware that targets MS-SQL…

1 year ago

APT Hackers Use FalseFont Backdoor to Remotely Hack Computers

Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data. In this…

1 year ago

Russian TrickBot Malware Developer Pleaded Guilty

Vladimir Dunaev, a resident of Amur Blast and aged 40, has confessed to creating and distributing Trickbot malware. The purpose…

1 year ago

Chinese Hackers Hijack Software Updates to Install Malware Since 2005

In order to obtain unauthorized access and control, hackers take advantage of software vulnerabilities by manipulating updates. By corrupting the…

1 year ago

198% Surge in Browser Based zero-hour Phishing Attacks

The digital landscape is under siege. Surging browser-based phishing attacks, a 198% increase in just the second half of 2023,…

1 year ago

Google Kubernetes Flaw Let Any Google User Control the Cluster

Researchers have discovered a new loophole in Google Kubernetes Engine (GKE), which threat actors can utilize with a Google account…

1 year ago

Kasseika Ransomware Exploits Driver Functionality to Kill Antivirus

Ransomware is a tool that hackers use to extort money from their targets like individuals, businesses, and governments. The malware…

1 year ago