Iron Tiger APT is behind a supply chain attack that employed messaging app MiMi
China-linked threat actors Iron Tiger backdoored a version of the cross-platform messaging app MiMi to infect systems. Trend Micro researchers uncovered a...
China-linked threat actors Iron Tiger backdoored a version of the cross-platform messaging app MiMi to infect systems. Trend Micro researchers uncovered a...
Flaws in Xiaomi Redmi Note 9T and Redmi Note 11 models could be exploited to disable the mobile payment mechanism and even...
The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are warning of Zeppelin ransomware attacks. The US Cybersecurity...
Russian hacker group Killnet claims to have launched a DDoS attack on the aerospace and defense giant Lockheed Martin. The...
C The NCSC is currently inviting organisations to help develop a new Cyber Advisor service. The initial 100 Cyber Advisor...
Researchers discovered a flaw in three signed third-party UEFI boot loaders that allow bypass of the UEFI Secure Boot feature....
This article explores event-driven architecture (EDA) with a detailed definition and explains how EDA offers many essential benefits to developers....
We found APT group Iron Tiger's malware compromising chat application Mimi’s servers in a supply chain attack. If you like...
The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The...
Threat actors are exploiting an authentication bypass Zimbra flaw, tracked as CVE-2022-27925, to hack Zimbra Collaboration Suite email servers worldwide. An authentication bypass...
The Conti ransomware gang is using BazarCall phishing attacks as an initial attack vector to access targeted networks. BazarCall attack,...
For more than a year, we have been providing free intelligence services via the OpenTIP portal. Using the web interface,...
We tracked the latest deployment of the group behind CopperStealer, this time stealing cryptocurrencies and users’ wallet account information via...
Explore 5 security considerations in-line with cyber insurance requirements to renew or obtain a policy while reducing your cyber risk....
Palo Alto Networks devices running the PAN-OS are abused to launch reflected amplification denial-of-service (DoS) attacks. Threat actors are exploiting...
A former Twitter employee was found guilty of spying on certain Twitter users for Saudi Arabia. A former Twitter employee,...
Cisco addressed a high severity flaw, tracked as CVE-2022-20866, affecting Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software....
In late August 2020, we published an overview of DeathStalker’s profile and malicious activities, including their Janicab, Evilnum and PowerSing...
Cisco discloses a security breach, the Yanluowang ransomware group breached its corporate network in late May and stole internal data....
New open source initiative helping organizations to detect and respond to cyber-attacks faster and easier If you like the site,...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
70% of Large enterprises that previously addressed the Log4j flaw are still struggling to patch Log4j-vulnerable assets. INTRODUCTION In December...
10 packages have been removed from the Python Package Index (PyPI) because they were found harvesting data. Check Point researchers...
Cloudflare revealed that at least 76 employees and their family members were targeted by smishing attacks similar to the one...