Google TAG Detects State-Backed Threat Actors Exploiting WinRAR Flaw
A number of state-back threat actors from Russia and China have been observed exploiting a recent security flaw in the…
A number of state-back threat actors from Russia and China have been observed exploiting a recent security flaw in the…
The North Korea-linked Lazarus Group (aka Hidden Cobra or TEMP.Hermit) has been observed using trojanized versions of Virtual Network Computing…
Citrix is warning of exploitation of a recently disclosed critical security flaw in NetScaler ADC and Gateway appliances that could…
In the ever-evolving landscape of cybersecurity, attackers are always searching for vulnerabilities and exploits within organizational environments. They don't just…
A threat actor, presumably from Tunisia, has been linked to a new campaign targeting exposed Jupyter Notebooks in a two-fold…
Government entities in the Asia-Pacific (APAC) region are the target of a long-running cyber espionage campaign dubbed TetrisPhantom. "The attacker…
A medium-severity flaw has been discovered in Synology's DiskStation Manager (DSM) that could be exploited to decipher an administrator's password…
Taiwanese networking equipment manufacturer D-Link has confirmed a data breach that led to the exposure of what it said is…
In what's the latest evolution of threat actors abusing legitimate infrastructure for nefarious ends, new findings show that nation-state hacking…
Two critical security flaws discovered in the open-source CasaOS personal cloud software could be successfully exploited by attackers to achieve…