Hackers exploited a zero-day vulnerability in the email services and SMTP servers of Salesforce. Malicious email traffic is often concealed within email gateway services that are...
The rapid growth in generative AI tech is dramatically changing the complete threat scenario since threat actors actively exploit this tech for several illicit purposes. While besides...
Google has announced an alerting and manual scanning mechanism which can be used to find unknown tracker alerts. This feature will be rolled out to Android 6.0+...
The ecommerce industry is on the rise. According to Statista, global e-commerce sales amounted to approximately $5.2 trillion. Moreover, experts predict this figure to reach about...
The Russian ransomware group ‘Clop’ exploits a flaw in Progress Software’s MOVEit product suite in late May to steal data from unprotected networks. According to German cybersecurity research firm...
Due to an unauthenticated critical RCE bug, formerly exploited as a zero-day in the wild by the threat actors, thousands of Citrix Netscaler ADC and Gateway servers...
Threat actors deliver NetSupport RAT through a new campaign called Fake SG which could rival with SocGholish. This campaign utilizes hacked WordPress websites to display a custom...
Renowned former hacker Kevin Mitnick unexpectedly passed away on Sunday at the age of 59. After being identified over a year ago, it has been reported...
A 28 years old Former IT security analyst of an Oxford-based company has been sentenced to three years for deceiving the company to extort money. On...
CISA urged government agencies to apply the patch immediately for Microsoft Office and Windows HTML remote code execution vulnerabilities exploited in the wild. As a result,...
Recent Comments