Veeam backup servers are being targeted by at least one group of threat actors known to work with multiple high-profile ransomware gangs. Malicious activity and tools...
The Computer Emergency Response Team of Ukraine (CERT-UA) says Russian hackers are targeting various government bodies in the country with malicious emails supposedly containing instructions on how to...
The Service Location Protocol (SLP) has been found to have a new reflective Denial-of-Service (DoS) amplification vulnerability. Threat actors can exploit this vulnerability to execute extensive...
The Ukranian Cyber police officers tracked down the 36-year-old resident of Netishyn as he was selling the personal data of more than 300 million victims from...
Cybersecurity analysts at Horizon3 detected that thousands of Apache Superset servers are exposed to RCE attacks at default configurations. This could allow the threat actors to...
Google uses Cryptbot info stealer for infecting Chrome users and stealing data, taking down associated malware infrastructure. The sole goal of this lawsuit is to reduce...
Recently, the cybersecurity researchers at Cyble discovered a new macOS malware, ‘Atomic’ (aka ‘AMOS’), sold for $1,000/month on private Telegram channels. Buyers pay a high price...
Are you searching for Linux Vulnerability scanners that can recognize, characterize, and categorize to Scan Linux Servers, etc? Regarding the security holes, this article can provide...
The RTM Locker ransomware gang has been discovered to utilize a Linux encryptor that focuses explicitly on virtual machines on VMware ESXi servers, making it the...
Single Sign-On, as the name suggests, is about signing in on no app and signing in on different types of apps without authenticating on other apps....