computer security

FortiOS & FortiProxy SSL-VPN Flaw Allows IP Spoofing via Malicious Packets

A critical vulnerability has been discovered in Fortinet's FortiOS SSL-VPN and FortiProxy SSL-VPN. The flaw, identified as FG-IR-23-225, allows attackers…

8 months ago

Zscaler Concludes Investigation: Only Test Servers Compromised

In a recent development, Zscaler Inc., a prominent cybersecurity firm, has concluded its investigation into a potential data breach initially…

9 months ago

Hackers Abuse GoTo Meeting Tool to Deploy Remcos RAT

In a sophisticated cyberattack campaign, hackers are using the online meeting platform GoToMeeting to distribute a Remote Access Trojan known…

9 months ago

Warning! Google Chrome Zero-day Vulnerability Exploited in Wild

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update…

9 months ago

Researchers Hacked Apple Infrastructure Using SQL Injection

Researchers found several points of entry for potential attackers, one of which was Apple's Book Travel portal, where they took…

9 months ago

F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely

In a significant cybersecurity development, researchers have uncovered critical vulnerabilities in F5's Next Central Manager, which could potentially allow attackers…

9 months ago

UK Ministry of Defence System Hacked by Chinese Hackers

Chinese state-sponsored hackers are highly sophisticated, leveraging advanced techniques and vast resources to conduct cyber espionage and steal sensitive data…

9 months ago

Best SIEM Tools List For SOC Team – 2024

The Best SIEM tools for you will depend on your specific requirements, budget, and organizational needs. There are several popular…

9 months ago

Meet the New Exclusive AI Malware Analyst: Gemini 1.5 Pro

Gemini 1.5 Pro is the latest version of the Gemini AI malware analysis platform, which is set to transform the…

9 months ago

Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox

Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch various attacks. PowerShell scripts can download…

9 months ago