Exfiltration of data from disposed electronic devices has been one of the various techniques used by threat actors for stealing sensitive information about an organization. This information is...
An Open-redirect vulnerability was discovered by IBM, which could allow threat actors to spoof the original URL of IBM Security Verify Access to lure victims into...
Trust Wallet made a significant announcement on November 14th, 2022, unveiling its newly launched browser extension for wide usage. The browser extension grants direct access to digital...
Spywares are software that is used as a surveillance application to collect sensitive information from victims and send it to the person who installed the application. These apps...
OpenAI’s ChatGPT, released in November 2022, stunned users with its diverse capabilities, answering questions and crafting custom essays, sparking widespread fascination. The versatility of ChatGPT significantly...
CISOs recognize the importance of integrating web applications and API security to protect sensitive customer data while facilitating seamless business operations. Recent headlines featuring security breaches...
AMD Zenbleed 2 processors were found vulnerable to use-after-free flaws, enabling data theft. While the exploitation of this flaw demands local code execution, less likely in...
Trustwave’s open-source Web Application Firewall (WAF) engine, ModSecurity, faces DoS risk due to four transformation actions vulnerability. Cybersecurity researchers at Trustwave identified this flaw and alerted the ModSecurity...
The purple fox malware has been active since 2018, adopting a new technique to deliver its payload through MS SQL servers. The threat actors target poorly managed MS...
Malware authors persistently seek novel approaches to exploit unsuspecting users in the active cyber threat landscape. To easily locate all the available files, folders, and other items on...
Recent Comments