A North Korea based threat actor targeting personal accounts of technology firms through low-profile social engineering attempts. This campaign utilizes a combination of repository invitations and...
Threat actors deliver NetSupport RAT through a new campaign called Fake SG which could rival with SocGholish. This campaign utilizes hacked WordPress websites to display a custom...
The Cybersecurity and Infrastructure Security Agency (CISA) recently released a security advisory that indicates that threat actors have been exploiting a Zero-day vulnerability in Citrix ADC (Application Delivery...
With your on-premise security solution comprising hardware, software, signatures, rules, and machine learning, you may think your applications are fully protected. How do you know for...
OpenMeetings is an application that can be used for video calls, collaborative work, and presentations. It can also be added as a plugin to Jira, Confluence...
P2PInfect is a new P2P worm that is actively targeting the Redis servers on Linux and Windows OS, making it highly scalable and powerful compared to...
The Biden administration wants to use public feedback to shape baseline cybersecurity regulations that function across industries and sectors. Following the announcement of the White House’s implementation...
The power grid is experiencing heightened threats from foreign adversaries and domestic extremist groups that can pose devastating consequences for the nation’s supply of electricity, experts...
The agency has been granted new and important roles under the Biden administration’s plan to safeguard U.S. digital networks. The Department of Justice announced a new...
A sophisticated nation-state adversary with advanced capabilities attacked Jumpcloud with a spear phishing attack. JumpCloud is a US-based zero-trust directory platform that customers use to authenticate,...
Recent Comments