Recently, the cybersecurity researchers at Cyble discovered a new macOS malware, ‘Atomic’ (aka ‘AMOS’), sold for $1,000/month on private Telegram channels. Buyers pay a high price...
Are you searching for Linux Vulnerability scanners that can recognize, characterize, and categorize to Scan Linux Servers, etc? Regarding the security holes, this article can provide...
The RTM Locker ransomware gang has been discovered to utilize a Linux encryptor that focuses explicitly on virtual machines on VMware ESXi servers, making it the...
Single Sign-On, as the name suggests, is about signing in on no app and signing in on different types of apps without authenticating on other apps....
Recently, a group of threat actors have disguised their malware as 38 Minecraft-inspired games on Google Play, infecting unsuspecting devices with the insidious ‘HiddenAds’ adware. While...
Every company should have an eye on its cybersecurity. But SaaS companies have their own set of concerns to be mindful of. With their business model...
Astrix’s Security Research Group reported a 0-day flow in the Google Cloud Platform (GCP) related to an OAuth flow exploitation. This method was termed “Ghosttoken.” Exploiting...
An AI-powered code analysis feature was recently launched by VirusTotal, dubbed “Code Insight.” Google Cloud Security AI Workbench’s Sec-PaLM large language model (LLM), optimized for security...
As per reports, Yellow Pages Group, the Canadian Directory Publisher, has been attacked by the Black Basta Ransomware Group. The threat actor also took responsibility for the cyberattack...
Cybersecurity analysts at Jamf Threat Labs have recently uncovered a macOS malware family. The new malware family has been tracked as “RustBucket,” which downloads and executes...
Recent Comments