Understanding Basics of Apache Kafka Threats Apache Kafka is an open-source platform designed for building real-time… rooter December 20, 2024 2 min read 0
Using map Command in Splunk Threats The map command in Splunk is a powerful tool that… rooter December 20, 2024 3 min read 0
Splunk: Using collect Command for Creating New Events in a New Index Threats In some scenarios, you may need to save the results… rooter December 20, 2024 2 min read 0
Lazarus Group Spotted Targeting Nuclear Engineers with CookiePlus Malware News The Lazarus Group, an infamous threat actor linked to the… rooter December 20, 2024 1 min read 0
U.S. CISA adds BeyondTrust software flaw to its Known Exploited Vulnerabilities catalog News U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds BeyondTrust Privileged… rooter December 20, 2024 2 min read 0
North Korean Hackers Responsible for 61% of All Crypto Thefts in 2024, Analysis Finds News North Korean (DPRK) hackers were responsible for 61 percent of… rooter December 20, 2024 1 min read 0
CVE-2023-34990: Critical Path Traversal Flaw Found in Fortinet FortiWLM Security On 12 May 2023, Horizon3 researcher Zach Hanley found an… rooter December 20, 2024 1 min read 0
Rspack npm Packages Compromised with Crypto Mining Malware in Supply Chain Attack News The developers of Rspack have revealed that two of their… rooter December 20, 2024 1 min read 0
Sophos Issues Hotfixes for Critical Firewall Flaws: Update to Prevent Exploitation News Sophos has released hotfixes to address three security flaws in… rooter December 20, 2024 1 min read 0
Raccoon Infostealer operator sentenced to 60 months in prison News Raccoon Infostealer operator Mark Sokolovsky was sentenced to 60 months… rooter December 20, 2024 4 min read 0