You might discover hundreds of open doors if you scan your website for security vulnerabilities. Our AppSec research across 1400 websites protected by AppTrana uncovered 33,000 critical, medium,...
Leaseweb, one of the world’s largest cloud and hosting providers, notified people that it’s working on restoring “critical” systems disabled following a recent security breach. In...
According to Cisco Talos, the Lazarus Group, backed by North Korea, is actively attacking the backbone infrastructure of the internet and entities in the healthcare sector...
A recent discovery highlights a significant QR code phishing campaign that targets Microsoft credentials across various industries. Notably, a major energy company based in the US is at...
The current rise of the Internet of Things (IoT) is at its peak and rapidly expanding its abilities by transforming basic items into controllable smart devices...
The well-known watch manufacturing company Seiko disclosed the data breach notification recently on Aug 2023, targeted by the notorious threat group BlackCat/ALPHV. BlackCat/ALPHV Group has been active since...
As per reports, Several vulnerabilities were discovered in Zoom’s Zero Touch Provisioning (ZTP) that allows threat actors to gain full remote administration of the devices resulting...
An alarming number of 120,000 computers have been infiltrated by stealer malware, and the credentials obtained from these infected devices are linked to cybercrime forums, a...
A new variant of SystemBC malware was found to be deployed to a critical infrastructure target. This malware was responsible for the DarkSide Colonial Pipeline Incident in 2021....
Structured audit logs, known as provenance graphs, outline system execution history, and recent studies investigate using them for automated host intrusion detection, stressing on APTs mainly....
Recent Comments