This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Windows Domain Controllers are rebooted and LSASS is br...
A proof-of-concept (PoC) attack for a security vulnerability in Windows Lightweight Directory Access Protocol (LDAP) that has been...
US Sanctions State-Backed Hacking Campaigns with a Chin...
Integrity Technology Group, Incorporated, a cybersecurity firm based in Beijing, was sanctioned by the U.S. Treasury Department's ...
Cyberhaven Chrome Extension Breach Highlights Software ...
Cyberhaven's recent security incident reveals the growing risks in software supply chain security. A malicious attack on its Chrom...
Critical Security Flaws in ASUS Routers Enable Remote C...
ASUS has warned of critical vulnerabilities in several router models that allow remote command execution. Affecting firmware versi...
The African Union Improves It's Investigative Skills Re...
Cybercrime Significantly Affects African Nations' Finances, Especially Those With Inadequate Secured Infrastructure.
US Soldier Arrested in AT&T and Verizon Hacks
Two counts of unauthorized transfer of private phone records were allegedly brought against a US Army soldier who was apprehended ...
Any Microsoft server can crash due to an unpatched Acti...
Microsoft addressed two serious Active Directory Domain Controller vulnerabilities last month, one of which may be exploited to cr...
EC2 Grouper Hackers Exploit AWS Credentials for Cloud A...
The EC2 Grouper hacking group has been leveraging compromised AWS credentials and AWS tools to conduct sophisticated attacks on cl...
Trend Micro Resolves Critical Privilege Escalation Vuln...
Trend Micro has patched six high-severity vulnerabilities in its Apex One and Apex One as a Service products, which could allow lo...
Modernizing Security: Adopting New Frameworks in 2025
As we progress through 2025, organizations face unprecedented security challenges that require modern solutions. The convergence o...
Organizations Banned for Using AI and Cyber Techniques ...
The U.S. Treasury's OFAC imposed sanctions on two organizations - one from Iran and one from Russia - for attempting to interfere ...
Critical Command Injection Vulnerability in DrayTek Vig...
DrayTek's Vigor2960 and Vigor300B devices have a critical vulnerability that allows attackers to inject arbitrary commands via the...