Patch Your WSO2: CVE-2022-29464 Exploited to Install Linux-Compatible Cobalt Strike Beacons, Other Malware
Users of WSO2 products are advised to update their respective products and platforms or to apply the temporary mitigation steps...
Users of WSO2 products are advised to update their respective products and platforms or to apply the temporary mitigation steps...
Cybersecurity is an industry known for many hats: white hats, black hats, and grey hats. White hats refer to “the...
A Runescape-themed missive landed in our email inbox today, claiming action is required to secure our account. The malicious email...
The FBI is warning academics to be on their guard, as an embattled education sector continues to experience attacks and...
SideWinder, an aggressive APT group, is believed to have carried out over 1,000 attacks since April 2020, Kaspersky reported. Researchers...
“Beam me up Scotty” will always remain my first association with teleportation. And as it stands now, we are still...
Microsoft released workarounds for a recently discovered zero-day vulnerability, dubbed Follina, in the Microsoft Office productivity suite. Microsoft has released workarounds for...
Cyber Research Labs reported a rise in ransomware attacks in the second quarter of 2022, small states are more exposed...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Interpol arrested three Nigerian men in Lagos, who are suspected of using the Agent Tesla RAT to reroute financial transactions...
Several researchers have come across a novel attack that circumvents Microsoft’s Protected View and anti-malware detection. The attack vector uses...
The BBC has revealed details of how a food bank in the UK was conned out of about $63,000 (£50,000)...
Experts warn of a new ongoing WhatsApp OTP scam that could allow attackers to hijack users’ accounts through phone calls....
The United States, Australia, and its Asian partners—India and Japan—have agreed to work on several cybersecurity initiatives on software, supply...
Intuit released a warning about a phishing email being sent to its customers. The phishing emails tell recipients that their...
A zero-day flaw in Microsoft Office that could be exploited by attackers to achieve arbitrary code execution on Windows systems....
Researchers discovered a new ransomware family called GoodWill that asks victims to donate the ransom for social causes. CloudSEK’s Threat Intelligence Research...
The operators of the EnemyBot botnet added exploits for recently disclosed flaws in VMware, F5 BIG-IP, and Android systems. Operators...
Pro-Russian hacker group KillNet is threatening again Italy, it announced a massive and unprecedented attack on May 30. Pro-Russian hacker...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
A man from New York was sentenced to four years in prison for trading stolen credit card data and assisting...
Learn more about the AWS Well-Architected Framework Sustainability Pillar and how to securely and efficiently implement the six design principles...
360 Qihoo reported DDoS attacks launched by APT-C-53 (aka Gamaredon) conducted through the open-source DDoS Trojan program LOIC. Researchers at 360 Qihoo observed...
The recently launched Industrial Spy data extortion marketplace has now started its ransomware operation. In April, Malware HunterTeam and Bleeping...