This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.
Category: Articles
Apple Patches Actively Exploited Vulnerabilities in Old...
Apple has released security updates to address three actively exploited vulnerabilities in older iPhone, iPad, and Mac models, ens...
FIN7 Deploys Python-Based Anubis Backdoor for Stealthy ...
The financially driven cybercrime group FIN7 has been linked to a Python-based backdoor named Anubis, which enables remote access ...
New Android Banking Trojan ‘Crocodilus’ Targets Users i...
Cybersecurity researchers have uncovered a sophisticated new Android banking malware called Crocodilus, which is primarily targeti...
SUN:DOWN Vulnerabilities Expose Critical Risks in Solar...
Cybersecurity researchers have identified 46 new security vulnerabilities across solar inverter products from Sungrow, Growatt, an...
Introducing The Low-Key Access Broker Fueling Russian S...
Russian Threat Groups, Including As The Military Cyber Unit Responsible For Attempted Coups, Assassinations, And Influence Operati...
RansomHub’s EDRKillShifter Tool Links Affiliates to Med...
A recent analysis has revealed connections between RansomHub affiliates and other ransomware groups such as Medusa, BianLian, and ...
Mozilla Patches Critical Firefox Sandbox Escape Followi...
Mozilla has rolled out security updates to fix a critical vulnerability in its Firefox browser for Windows, closely following Goog...
CISA Flags Exploited Sitecore CMS Flaws as Next.js and ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old vulnerabilities affecting Sitecore CMS...
An Agreement Is Signed By Huawei And The Kenyan Nationa...
The National Computer And Cybercrime Coordination committee And Huawei Technologies Kenya Signed A Memorandum Of Understanding Thu...
Google Releases Emergency Chrome Patch to Address Activ...
Google has rolled out an out-of-band security update to fix a high-severity vulnerability in its Chrome browser for Windows, which...
Microsoft Strengthens Edge for Business with AI-Driven ...
On Monday, Microsoft introduced a new feature called inline data protection for its enterprise-focused Edge for Business web brows...
GitHub Supply Chain Attack Expands Beyond Coinbase in W...
A sophisticated supply chain attack targeting the GitHub Action "tj-actions/changed-files" initially began as a focused assault on...