Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions News Google has announced plans to add a new feature in… rooter August 21, 2023 1 min read 0
NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security News A previously undetected attack method called NoFilter has been found to abuse… rooter August 21, 2023 1 min read 0
China-Linked Bronze Starlight Group Targeting Gambling Sector with Cobalt Strike Beacons News An ongoing cyber attack campaign originating from China is targeting… rooter August 21, 2023 1 min read 0
New LABRAT Campaign Exploits GitLab Flaw for Cryptojacking and Proxyjacking Activities News A new, financially motivated operation dubbed LABRAT has been observed weaponizing a… rooter August 21, 2023 1 min read 0
New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode News Cybersecurity researchers have documented a novel post-exploit persistence technique on… rooter August 21, 2023 1 min read 0
Why You Need Continuous Network Monitoring? News Changes in the way we work have had significant implications… rooter August 21, 2023 1 min read 0
Russian Hackers Use Zulip Chat App for Covert C&C in Diplomatic Phishing Attacks News An ongoing campaign targeting ministries of foreign affairs of NATO-aligned… rooter August 21, 2023 1 min read 0
CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks News The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added… rooter August 21, 2023 1 min read 0
What’s the State of Credential theft in 2023? News At a little overt halfway through 2023, credential theft is… rooter August 21, 2023 1 min read 0
Experts Uncover Weaknesses in PowerShell Gallery Enabling Supply Chain Attacks News Active flaws in the PowerShell Gallery could be weaponized by… rooter August 21, 2023 1 min read 0