Clearsky researchers linked the Lebanese Cedar APT group to a cyber espionage campaign that targeted companies around the world. Clearsky…
The TeamTNT cybercrime group has improved its Linux cryptocurrency miner by implementing open-source detection evasion capabilities. The TeamTNT cybercrime group…
Researchers from RiskIQ have discovered a new phishing kit dubbed LogoKit that dynamically compose phishing content. Researchers from RiskIQ discovered…
The U.S. CISA published a security advisory for High-Severity flaws in some SCADA/HMI products made by Japanese company Fuji Electric.…
A joint operation of U.S. and EU law enforcement authorities allowed the seizure of the leak sites used by NetWalker…
A global operation of law enforcement has dismantled the infrastructure of the infamous Emotet botnet. A global operation of law…
Trend Micro’s Zero Day Initiative announced the Pwn2Own Vancouver 2021 hacking competition that will also cover Zoom, MS Teams Exploits.…
Let's talk about cyber risk in the maritime and port setting to better understand Maritime Port cybersecurity. In order to…
Apple has addressed three zero-day vulnerabilities in its iOS operating system that have been exploited in the wild. Apple has…
CVE-2021-3156 Sudo vulnerability has allowed any local user to gain root privileges on Unix-like operating systems without authentication. Sudo is one…
This website uses cookies.