F5 Networks has issued a security alert about a severe vulnerability in its BIG-IP Configuration utility, identified as CVE-2023-46748. This…
Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage…
AhnLab Security Emergency Response Center (ASEC) has recently revealed a disturbing case of Remcos RAT, a malicious software that can…
Law enforcement officials have successfully apprehended a notorious criminal organization responsible for perpetrating computer scams and stealing sensitive data belonging…
The US-based software firm Okta has discovered malicious activity using a stolen credential to access Okta's support case management system.…
The US cybersecurity organization CISA has updated its Known Exploited Vulnerabilities catalog to include five new security flaws that are…
Threat actors target telecoms and government ministries because they house valuable data and infrastructure. Telecoms hold sensitive communication records and…
In September 2023, FortiGuard Labs' vigilant team uncovered a significant development in the IZ1H9 Mirai-based DDoS campaign. This campaign, known…
The Trojan War's famous horse trick inspired the term for cyberattacks, where a user unwittingly downloads a file that causes…
Cyber attacks are becoming increasingly sophisticated as threat actors continuously evolve their tools and tactics. They leverage advanced technologies, use…