computer security

PoC Exploit Released For Critical Oracle VirtualBox VulnerabilityPoC Exploit Released For Critical Oracle VirtualBox Vulnerability

PoC Exploit Released For Critical Oracle VirtualBox Vulnerability

Oracle Virtualbox was identified and reported as having a critical vulnerability associated with Privilege Escalation and Arbitrary File Move/Delete. This…

1 year ago
Tracing the Steps of Cyber Intruders: The Path of Lateral MovementTracing the Steps of Cyber Intruders: The Path of Lateral Movement

Tracing the Steps of Cyber Intruders: The Path of Lateral Movement

When cyber attacks strike, it's rarely a single computer that suffers. Nowadays, cybercriminals set their sights on corporate networks, aiming…

1 year ago
Volkswagen Group’s Systems Hacked: 19,000+ Documents StolenVolkswagen Group’s Systems Hacked: 19,000+ Documents Stolen

Volkswagen Group’s Systems Hacked: 19,000+ Documents Stolen

The Volkswagen Group has fallen victim to a sophisticated hacking incident, with over 19,000 sensitive documents stolen. Investigations point towards…

1 year ago
Windows MagicDot Path Flaw Lets Attackers Gain Rootkit-Like AbilitiesWindows MagicDot Path Flaw Lets Attackers Gain Rootkit-Like Abilities

Windows MagicDot Path Flaw Lets Attackers Gain Rootkit-Like Abilities

A new vulnerability has been unearthed, allowing attackers to gain rootkit-like abilities on Windows systems without requiring administrative privileges. Dubbed…

1 year ago
Researchers Claim that Windows Defender Can Be BypassedResearchers Claim that Windows Defender Can Be Bypassed

Researchers Claim that Windows Defender Can Be Bypassed

Cybersecurity experts from SafeBreach have revealed a series of vulnerabilities that could allow attackers to remotely delete files on a…

1 year ago
Akira Ransomware Attacks Over 250 Organizations and Collects $42 MillionAkira Ransomware Attacks Over 250 Organizations and Collects $42 Million

Akira Ransomware Attacks Over 250 Organizations and Collects $42 Million

The Akira ransomware variant has severely impacted more than 250 organizations worldwide, amassing approximately USD 42 million in ransom payments.…

1 year ago
Phishing-as-a-Service Platform LabHost Seized by AuthoritiesPhishing-as-a-Service Platform LabHost Seized by Authorities

Phishing-as-a-Service Platform LabHost Seized by Authorities

Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across the globe. The crackdown on LabHost,…

1 year ago
What is Encryption in Malware? – Understand From Basics to XORWhat is Encryption in Malware? – Understand From Basics to XOR

What is Encryption in Malware? – Understand From Basics to XOR

Malware commonly encrypts its traffic (stolen data sent to a command-and-control server) and internal strings (like URLs and configurations) to…

1 year ago
Tor Browser 13.0.14 Released – What’s New!Tor Browser 13.0.14 Released – What’s New!

Tor Browser 13.0.14 Released – What’s New!

The Tor Project has released a new version of the Tor Browser, their secure and private web browsing tool. Tor…

1 year ago
Connect:fun Attacking Organizations Running Fortinet’s FortiClient EMSConnect:fun Attacking Organizations Running Fortinet’s FortiClient EMS

Connect:fun Attacking Organizations Running Fortinet’s FortiClient EMS

A new exploit campaign has emerged, targeting organizations that utilize Fortinet’s FortiClient EMS. Dubbed "Connect:fun" by Forescout Research – Vedere…

1 year ago