Security researchers are warning of a new Microsoft Exchange zero-day that are being exploited by malicious actors in the wild.…
Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used…
Several hacker groups are assisting protestors in Iran using Telegram, Signal and other tools to bypass government censorship. Check Point…
The Brute Ratel post-exploitation toolkit has been cracked and now is available in the underground hacking and cybercrime communities. Threat…
A new multifunctional Go-based malware dubbed Chaos is targeting both Windows and Linux systems, experts warn. Researchers from Black Lotus Labs…
The recently discovered malware builder Quantum Builder is being used by threat actors to deliver the Agent Tesla RAT. A…
ONLINE DISINFORMATION is one of the defining issues of our time and the influence of fake news has become an…
The Russia-linked APT28 group is using mouse movement in decoy Microsoft PowerPoint documents to distribute malware. The Russia-linked APT28 employed a technique…
The recently born Bl00Dy Ransomware gang has started using the recently leaked LockBit ransomware builder in attacks in the wild.…
nuvola is the new open-source cloud security tool to address the privilege escalation in cloud environments. nuvola is the new…
This website uses cookies.