A critical Zip Slip vulnerability was discovered in the open-source data cleaning and transformation tool ‘OpenRefine’, which allowed attackers to import malicious…
Cloudflare, a prominent cybersecurity vendor renowned for its web protection services, faces a security challenge that could expose its customers…
Through strategies like polymorphic code, which continuously alters its appearance to prevent detection, as well as employing encryption and obfuscation…
EvilBamboo, formerly known as “Evil Eye,” has been found to target Tibetan, Uyghur, and Taiwanese organizations and individuals. This threat…
The financially motivated GOLD MELODY threat group has been active at least since 2017, attacking organizations by taking advantage of…
Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use…
Cryptojacking is a malicious cyberattack in which an attacker stealthily utilizes a victim's computer or device to mine cryptocurrencies such…
A new and highly concerning cyber threat has emerged, as a botnet known as "MrTonyScam" has been orchestrating an extensive…
Recent reports indicate that a new threat actor named “W3LL” has been discovered running a large phishing empire completely hidden…
Google's Threat Analysis Group (TAG) has issued an update regarding an ongoing campaign by North Korean threat actors targeting security…