Global radios rely on the TETRA (Terrestrial Trunked Radio) standard, but various vulnerabilities and multiple flaws have been uncovered, impacting its usage in Europe, the UK, and other nations, affecting...
Apple has issued security patches to address zero-day vulnerabilities that have been exploited in attacks against iPhones, Macs, and iPads that seriously affect the digital security of Apple...
On July 18th, Atlassian discovered critical and high vulnerabilities through bug bounty programs, third-party library scans, and penetration testing. In their security bulletin, they have addressed...
The Virustotal platform has issued an apology and provided an update regarding a recent incident of accidental data exposure. VirusTotal was established in 2004 as a...
Recent reports indicate that the banking sector has become the focus of threat actors utilizing an emerging supply chain attack. Two distinct incidents have been identified,...
Campaigns of Fraudulent Job offers target university students in North America, asking victims to pay a fee in exchange for work. The campaigns began as early...
A new ransomware strain dubbed, Mallox (aka TargetCompany, FARGO, and Tohnichi) is actively targeting and attacking Microsoft SQL (MS-SQL) servers. Since June 2021, this new ransomware strain has...
A North Korea based threat actor targeting personal accounts of technology firms through low-profile social engineering attempts. This campaign utilizes a combination of repository invitations and...
Threat actors deliver NetSupport RAT through a new campaign called Fake SG which could rival with SocGholish. This campaign utilizes hacked WordPress websites to display a custom...
With your on-premise security solution comprising hardware, software, signatures, rules, and machine learning, you may think your applications are fully protected. How do you know for...
Recent Comments