computer security

Warning! Google Chrome Zero-day Vulnerability Exploited in Wild

Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update…

11 months ago

Researchers Hacked Apple Infrastructure Using SQL Injection

Researchers found several points of entry for potential attackers, one of which was Apple's Book Travel portal, where they took…

11 months ago

F5’s Next Central Manager Vulnerabilities Let Hackers Take Full Device Control Remotely

In a significant cybersecurity development, researchers have uncovered critical vulnerabilities in F5's Next Central Manager, which could potentially allow attackers…

11 months ago

UK Ministry of Defence System Hacked by Chinese Hackers

Chinese state-sponsored hackers are highly sophisticated, leveraging advanced techniques and vast resources to conduct cyber espionage and steal sensitive data…

11 months ago

Best SIEM Tools List For SOC Team – 2025

The Best SIEM tools for you will depend on your specific requirements, budget, and organizational needs. There are several popular…

11 months ago

Meet the New Exclusive AI Malware Analyst: Gemini 1.5 Pro

Gemini 1.5 Pro is the latest version of the Gemini AI malware analysis platform, which is set to transform the…

11 months ago

Analyze Malicious Powershell Scripts by Running Malware in ANY.RUN Sandbox

Hackers exploit PowerShell, a built-in scripting tool on Windows (and sometimes Linux), to launch various attacks. PowerShell scripts can download…

12 months ago

Cyber Attack Defenders Up For Battle: Huge Uptick In Timely Detections

Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised systems. This is achieved by targeting…

12 months ago

PoC Exploit Released For Critical Oracle VirtualBox Vulnerability

Oracle Virtualbox was identified and reported as having a critical vulnerability associated with Privilege Escalation and Arbitrary File Move/Delete. This…

12 months ago

Tracing the Steps of Cyber Intruders: The Path of Lateral Movement

When cyber attacks strike, it's rarely a single computer that suffers. Nowadays, cybercriminals set their sights on corporate networks, aiming…

12 months ago