Threat actors use recently discovered CVE-2021-26084 Atlassian Confluence
Threat actors are actively exploiting the recently disclosed CVE-2021-26084 RCE vulnerability in Atlassian Confluence deployments. Trend Micro researchers have spotted...
Threat actors are actively exploiting the recently disclosed CVE-2021-26084 RCE vulnerability in Atlassian Confluence deployments. Trend Micro researchers have spotted...
The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider...
Facebook released Mariana Trench, an internal open-source tool that can be used to identify vulnerabilities in Android and Java applications....
The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet...
Security and privacy advocates may have cause to worry after all: Portpass, a vaccine passport app in Canada, has been...
Microsoft offers to help you with patching Exchange servers, CISA offers an insider threat tool, and together with the NSA...
Instagram has announced it is pausing the development of its newest brainchild, Instagram Kids—a version of Instagram aimed at 10-12-year-olds,...
The Japanese government on Tuesday officially approved a new three-year cybersecurity strategy, where Russia, China and North Korea are mentioned...
Cybersecurity researcher at Comparitech has identified a misconfigured MongoDB database containing a treasure trove of data left uncovered to the...
A fully working exploit for the remote code execution vulnerability in VMware vCenter labelled as CVE-2021-22005 is now publicly accessible,...
One of the prominent targets for hackers is Microsoft Exchange, and the attack vector typically involves a popular vulnerability which...
Hackers have used a credential phishing attack to steal data from Office 365, Google Workspace, and Microsoft Exchange by spoofing...
Background In December 2020, news of the SolarWinds incident took the world by storm. While supply-chain attacks were already a...
WebStor is a tool implemented in Python under the MIT license for quickly enumerating all websites across all of your...
Kodex (Community Edition - CE) is an open-source toolkit for privacy and security engineering. It helps you to automate data...
Security researchers uncovered a massive malware operation, dubbed GriftHorse, that has already infected more than 10 million Android devices worldwide....
The U.S. CISA and the NSA agencies have published guidance for securely using virtual private network (VPN) solutions. The U.S....
Russian media reported that the police made searches in the Moscow office of security firm Group-IB apparently linked to an...
Experts spotted a new variant of the FinFisher surveillance spyware that is able to hijack and replace the Windows UEFI...
Trend Micro has addressed a critical authentication bypass vulnerability, tracked as CVE-2021-36745, affecting the ServerProtect solution. Trend Micro has released security patches...
Microsoft’s Threat Intelligence Center has been analyzing a custom-built backdoor that has been used by the Nobelium group since April...
pcTattleTale hasn’t been very careful about securing the screenshots it sneakily takes from its victims’ phones. pcTattleTale markets itself as...
Positive Technologies is developing a new concept of cyber security standard. The document should become an open knowledge base, which...
At least five French ministers and President Emmanuel Macron's diplomatic advisor mobile phones have been infected by Israel-made Pegasus spyware,...