Ghost Calls: Stealthy C2 Attack Exploits Zoom, Teams, and Meet
A novel attack technique dubbed “Ghost Calls” has emerged, exploiting web conferencing platforms like Zoom, Microsoft Teams, and Google Meet…
A novel attack technique dubbed “Ghost Calls” has emerged, exploiting web conferencing platforms like Zoom, Microsoft Teams, and Google Meet…
Security researchers have recently demonstrated a significantly improved exploit for the Retbleed CPU vulnerability, highlighting the ongoing risks posed by…
A recently identified command injection vulnerability, CVE-2025-53652, in the Jenkins Git Parameter plugin puts approximately 15,000 Jenkins servers at risk…
Data compliance has become a top concern for organizations worldwide. With governments enacting new data protection laws across the globe,…
In a rare squid/security combined post, a new vulnerability was discovered in the Squid HTTP proxy server.
Google’s vulnerability finding team is again pushing the envelope of responsible disclosure: Google’s Project Zero team will retain its existing…
One minute, your website is working perfectly. Customers are browsing, logging in, placing orders. Then out of nowhere, it all…
A fundamental vulnerability within the HTTP/1.1 protocol poses a significant threat to millions of websites, potentially allowing attackers to execute…
Executive Summary A critical vulnerability in WinRAR, identified as CVE-2023-38831, is being actively exploited by threat actors to execute arbitrary…
The government of China has accused Nvidia of inserting a backdoor into their H20 chips: China’s cyber regulator on Thursday…