Nov 30, 2023NewsroomRansomware / Vulnerability A CACTUS ransomware campaign has been observed exploiting recently…
Exploits
-
-
1 Given the continuous rise in active exploitation of the now-known CitrixBleed flaw, governments…
-
ESET Research ESET Research recommends updating Roundcube Webmail to the latest available version as…
-
The new 0-Day vulnerability was actively exploited by the Winter Vivern cyberespionage group before…
-
Oct 25, 2023NewsroomExploit / Vulnerability Virtualization services provider VMware has alerted customers to the…
-
Cyber Crime
LinkedIn Phishing Scam Exploits Smart Links to Steal Microsoft Accounts
by adminby adminCofense cybersecurity researchers have noticed a sudden uptick in phishing messages sent via LinkedIn,…
-
Oct 11, 2023NewsroomVulnerability / Endpoint Security Microsoft has released its Patch Tuesday updates for…
-
KEY FINDINGS Storm-0324 is a financially motivated threat actor that has been facilitating ransomware…
-
This means that cloud search is only available to skilled users, making other less…
-
Aug 24, 2023THNCyber Attack / Hacking The North Korea-linked threat actor known as Lazarus…