Russia-linked APT29 group changes TTPs following April advisories
The UK and US cybersecurity agencies have published a report detailing techniques used by Russia-linked cyberespionage group known APT29 (aka...
The UK and US cybersecurity agencies have published a report detailing techniques used by Russia-linked cyberespionage group known APT29 (aka...
Summary: A remote authentication restriction bypass vulnerability was discovered in Aruba AirWave Management Platform version(s) prior to 8.2.12.1. Aruba has...
Summary: Prisma is an open source ORM for Node.js & TypeScript. As of today, we are not aware of any...
Summary: MERCUSYS Mercury X18G 1.0.5 devices allow Denial of service via a crafted value to the POST listen_http_lan parameter. Upon...
Summary: Emmanuel MyDomoAtHome (MDAH) REST API REST API Domoticz ISS Gateway 0.2.40 is affected by an information disclosure vulnerability due...
Ferris, the Rust mascot Developers of the malicious downloader Buer have taken the unusual step of rewriting the malware in...
Since the first stay-at-home measures were imposed by governments to keep everyone safe from the worsening COVID-19 pandemic, we at...
If you use a Google account, it may soon be mandatory to sign up to Google’s two-step verification program. As...
A Virtual Private Network (VPN) creates a safe “tunnel” between you and a computer you trust (normally your VPN provider)...
According to Sberbank Bi.Zone branch cybersecurity specialists, most users use passwords that are too simple, which cybercriminals can easily guess...
On Wednesday afternoon New South Wales (NSW) police unit has disclosed an apparent ransomware attack on the New South Wales...
A smishing campaign which goes by the name Roaming Mantis is imitating a logistics firm to hack SMS messages and...
Qakbot, also known as QBot or Pinkslipbot, is a banking trojan that has been active since 2007. It has been...
Security scientists who believe that a weakness that can be used to insert malicious code mostly on mobile by using...
WordPress Brute Force Super Fast Login .---. .----------- / __ / ------ / / ( )/ ----- ////// ' /...
CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect...
CyberNews researchers found more than 29,000 unprotected databases worldwide that are still publicly accessible, leaving close to 19,000 terabytes of...
HideezKey- This is a deep-dive into a nice concept for a security token & password manager that turned into a...
VMware has fixed a new critical RCE flaw in VMware vRealize Business for Cloud that was reported by sanctioned Russian...
The Cuba Ransomware gang has partnered with the crooks behind the Hancitor malware in attacks aimed at corporate networks. The Hancitor downloader...
Let’s look at what types of threats each layer of the TCP/IP protocol stack may be susceptible to. The task...
Experts spotted a new malware, dubbed Moriya rootkit, that targets Windows systems as part of cyberespionage campaign dubbed TunnelSnake. An...
Summary: Mac Endpoint for Sophos Central before 9.9.6 and Mac Endpoint for Sophos Home before 2.2.6 allow Privilege Escalation. Reference...
Summary: In Hardware Sentry KM before 10.0.01 for BMC PATROL, a cleartext password may be discovered after a failure or...