Businesses and developers are focusing more on the security of applications in their digital environment as cyber threats and data breaches continue escalating. The average data...
A North Korea based threat actor targeting personal accounts of technology firms through low-profile social engineering attempts. This campaign utilizes a combination of repository invitations and...
Threat actors deliver NetSupport RAT through a new campaign called Fake SG which could rival with SocGholish. This campaign utilizes hacked WordPress websites to display a custom...
The Cybersecurity and Infrastructure Security Agency (CISA) recently released a security advisory that indicates that threat actors have been exploiting a Zero-day vulnerability in Citrix ADC (Application Delivery...
With your on-premise security solution comprising hardware, software, signatures, rules, and machine learning, you may think your applications are fully protected. How do you know for...
OpenMeetings is an application that can be used for video calls, collaborative work, and presentations. It can also be added as a plugin to Jira, Confluence...
An alarming spear-phishing campaign has been uncovered, specifically aimed at government organizations. This attack preys on the vulnerabilities of Zimbra and Roundcube email servers. It is...
LLMs have reshaped content generation, making understanding jailbreak attacks and prevention techniques challenging. Surprisingly, there’s a scarcity of public disclosures on countermeasures employed in chatbot services...
The latest news revealed a popular Google platform to scan malicious documents from Virustotal exposed to data breaches of its registered customers. At the end of...
The Ukrainian cyberpolice has uncovered a notorious criminal who operated bot farms, spread aggressive propaganda, and committed online fraud. A bot farm is a collective of...