US DoD announced the results of the Hack US bug bounty challenge

3 years ago

The US Department of Defense (DoD) shared the results of the Hack US bug bounty program that took place in July.…

Microsoft confirms Exchange zero-day flaws actively exploited in the wild

3 years ago

Microsoft confirmed that two recently disclosed zero-day flaws in Microsoft Exchange are being actively exploited in the wild. Microsoft confirmed…

Unpatched Microsoft Exchange Zero-Day actively exploited in the wild

3 years ago

Security researchers are warning of a new Microsoft Exchange zero-day that are being exploited by malicious actors in the wild.…

Experts uncovered novel Malware persistence within VMware ESXi Hypervisors

3 years ago

Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used…

Hacker groups support protestors in Iran using Telegram, Signal and Darkweb

3 years ago

Several hacker groups are assisting protestors in Iran using Telegram, Signal and other tools to bypass government censorship. Check Point…

A cracked copy of Brute Ratel post-exploitation tool leaked on hacking forums

3 years ago

The Brute Ratel post-exploitation toolkit has been cracked and now is available in the underground hacking and cybercrime communities. Threat…

Go-based Chaos malware is rapidly growing targeting Windows, Linux and more

3 years ago

A new multifunctional Go-based malware dubbed Chaos is targeting both Windows and Linux systems, experts warn. Researchers from Black Lotus Labs…

Threat actors use Quantum Builder to deliver Agent Tesla malware

3 years ago

The recently discovered malware builder Quantum Builder is being used by threat actors to deliver the Agent Tesla RAT. A…

ONLINE DISINFORMATION: Under the hood of a Doppelgänger

3 years ago

ONLINE DISINFORMATION is one of the defining issues of our time and the influence of fake news has become an…

APT28 relies on PowerPoint Mouseover to deliver Graphite malware

3 years ago

The Russia-linked APT28 group is using mouse movement in decoy Microsoft PowerPoint documents to distribute malware. The Russia-linked APT28 employed a technique…

This website uses cookies.