Tag: Vulnerability
-
Ensuring the Security and Efficiency of Web Applications and Systems
As the number of applications and systems used in businesses grows, so do the threats and vulnerabilities that can lead to unauthorized …
-
NDR in the Modern Cybersecurity Landscape
In today’s information age, businesses are increasingly reliant on interconnected networks and cloud infrastructures, and protecting …
-
Google Patches Critical Chrome Vulnerability and Additional Flaws
Google Chrome users beware! A critical vulnerability (CVE-2024-4058) has been patched in the latest update (version …
-
Popular File Transfer Software CrushFTP Hit by Zero-Day Exploit
A critical zero-day vulnerability in CrushFTP, a popular file transfer software, allows attackers to download sensitive system files. This …
-
Fraudsters Exploit Telegram’s Popularity For Toncoin Scam
Scammers have been observed employing a sophisticated tactic to steal Toncoins (TON) from Telegram users globally. This scheme, uncovered …
-
6 Surprising Ways Hackers Can Exploit Your Smart Home Devices
Did you know that in 2022 there were over 112 million malware attacks on smart home devices and other IoT devices? These gadgets that help …
-
New Cyber-Threat MadMxShell Exploits Typosquatting and Google Ads
Security researchers have uncovered a new threat actor leveraging fake domains masquerading as authentic IP scanner software sites. Zscaler …
-
Palo Alto ZeroDay Exploited in The Wild Following PoC Release
The threat actors are now actively exploiting this Palo Alto ZeroDay in the wild following the PoC release. Palo Alto ZeroDay Exploited …
-
Armis Acquires AI-based Vulnerability Detection Firm Silk Security
Armis, a leading cybersecurity company, has acquired Silk Security, an AI-powered vulnerability detection firm. The acquisition comes when …
-
Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)
Zero Knowledge Networking vendor shrugs off firewall flaw In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) …
-
North Korean Group Kimsuky Exploits DMARC and Web Beacons
Security researchers have uncovered new tactics associated with the threat actor TA427, also known as Emerald Sleet, APT43, THALLIUM or …
-
Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control
Security researchers at Cado Security Labs have uncovered a new variant of the Cerber ransomware targeting Linux systems. This strain of …
●●●