Experts shared PoC exploit code for RCE in Zoho ManageEngine ADAudit Plus tool
Researchers shared technical details and proof-of-concept exploit code for the CVE-2022-28219 flaw in Zoho ManageEngine ADAudit Plus tool. Security researchers...
Researchers shared technical details and proof-of-concept exploit code for the CVE-2022-28219 flaw in Zoho ManageEngine ADAudit Plus tool. Security researchers...
A cyber attack forced the American publishing giant Macmillan to shut down its IT systems. The publishing giant Macmillan has...
Researchers warn of a new ‘SessionManager’ Backdoor that was employed in attacks targeting Microsoft IIS Servers since March 2021. Researchers...
Microsoft spotted a cloud threat actor tracked as 8220 that is now targeting Linux servers in a long-running cryptomining campaign....
Researchers have analysed a campaign leveraging infected SOHO routers to target predominantly North American and European networks of interest. The...
The popular malware Raccoon stealer, which suspended operations after a developer allegedly died in the Ukraine invasion, has returned. Raccoon...
Organisations working in the immigration sector are advised to be on high alert for Advanced Persistent Threat (APT) attacks. Bleeping...
Norway’s National Security Authority (NSM) confirmed that a DDoS attack took down some of the country’s most important websites. Norway’s...
Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules...
Good news for the victims of the Hive ransomware, Korean security researchers have released a free decryptor for some versions....
We look into a recent attack orchestrated by the Black Basta ransomware ransomware group that used the banking trojan QakBot...
While DevOps and site reliability engineering teams often work together and have shared goals, there are important distinctions between the...
North Korea-linked Lazarus APT group is suspected to be behind the recent hack of the Harmony Horizon Bridge. Recently, threat...
A former Canadian government IT worker admitted to being a high-level member of the Russian cybercrime group NetWalker. A former...
Researchers detailed a new information-stealing malware, dubbed YTStealer, that targets YouTube content creators. Intezer cybersecurity researchers have detailed a new...
Trend Micro Security Researcher, Erin Sindelar, breaks down three popular types of cloud risk assessments to help CISOs and security...
Researchers discovered a new flaw in RARlab’s UnRAR utility, tracked CVE-2022-30333, that can allow to remotely hack Zimbra Webmail servers....
The MITRE organization published the 2022 CWE Top 25 most dangerous software weaknesses. The MITRE shared the list of the 2022 top...
Brave Search, Brave Software’s privacy search engine, just turned one. To celebrate, the company says it is moving the search...
A person working in the city of Amagasaki, in Western Japan, has mislaid a USB stick which contained data on...
Google’s Threat Analysis Group (TAG) has revealed a sophisticated spyware activity involving ISPs (internet service providers) aiding in downloading powerful...
The RansomHouse gang claims to have breached the Chipmaker giant AMD and stole 450 GB of data from the company...
This paper provides a taxonomic classification of non-state actors in the cyberspace, analyzing their role and impact on a state’s...
We analyzed cases of a Log4Shell vulnerability being exploited in certain versions of the software VMware Horizon. Many of these...