Generative AI technology is rapidly growing and advancing, driven by continuous research and development efforts. But, besides the growing advancements and positive things, these generative AI...
The latest research reveals a new sophisticated attack carried through Webapk technology targeting Android devices. The threat actors manipulate the user to install malicious web apk...
Zimbra is a widely used email client used by many organizations worldwide. The Zimbra Collaboration Suite provides a much more comprehensive package of document storage, Editing,...
Wireshark, an industry-leading network packet analyzer, has released version 4.0.7, which includes defect fixes, protocol updates, and a few enhancements. It continues to be an extensively...
A ‘critical’ severity flaw has been detected in FortiOS and FortiProxy, identified as CVE-2023-33308 (CVSS rating 9.8). A remote attacker can use the vulnerability on susceptible devices to execute Fortinet arbitrary...
The significant plunge in cyber crimes shows a decent rise in legitimate services in the mid of this year, 2023. However, the rise in ransomware attacks...
Recent reports from Team82 and Check Point Research (CPR) team state that there has been a major vulnerability in QuickBlox SDK (Software Development Kit) and API (Application...
A china based APT actor accessed Microsoft 365 cloud environment and exfiltrated unclassified Exchange Online Outlook data from a small number of accounts. In June 2023, a...
Russia’s invasion of Ukraine on February 24, 2022, followed escalating cyber operations, categorized into six phases, by Russian troops amassed at the border. Beyond the focus...
Adobe addressed critical security issues in ColdFusion and InDesign. Users should install security updates immediately to ensure system safety. Stay informed and prioritize security maintenance to...
Recent Comments