A federal judge has issued a directive to the Trump administration to preserve Signal messages exchanged among...
vulnerability
Reports indicate that a prominent Indonesian educational technology platform may have been the target of a cybersecurity...
A severe remote code execution (RCE) vulnerability has been identified in the Ingress NGINX Controller, allowing attackers...
AhnLab’s Threat Intelligence Platform has released 19 new Snort rules addressing critical vulnerabilities including PostgreSQL SQL injection...
A newly discovered malware campaign is leveraging the JPHP interpreter – a PHP implementation running on the...
Security teams worldwide are grappling with widespread exploitation of Ivanti Connect Secure VPN appliances, as researchers uncover...
Recent forensic investigations by Volexity have uncovered a sophisticated attack campaign exploiting two chained zero-day vulnerabilities in...
A critical zero-day vulnerability (CVE-2024-3400) in Palo Alto Networks’ PAN-OS firewalls has been actively exploited since at...
A critical zero-day vulnerability (CVE-2024-3400) in Palo Alto Networks’ PAN-OS GlobalProtect feature has been actively exploited since...
A sophisticated malware campaign dubbed “Arcane Stealer” is actively targeting gamers and VPN users through compromised YouTube...
The XE Group, a cybercrime syndicate with suspected Vietnamese origins, has dramatically evolved its operations from traditional...
Active Directory Discretionary Access Control Lists (DACLs) serve as a fundamental security mechanism governing access to directory...
Active Directory (AD) credential dumping remains a significant threat, with attackers increasingly exploiting overlooked attributes like user...
Legacy configurations in Active Directory (AD) often introduce security vulnerabilities, and one of the most persistent risks...
Tcpick provides security teams with specialized capabilities for reconstructing and analyzing TCP streams from packet captures. This...
Network traffic analysis often reveals hidden artifacts, including images transferred over HTTP. These images can contain valuable...
Security teams at enterprise organizations can leverage Shodan’s command-line interface (CLI) to enhance external threat intelligence gathering....
A new malware campaign has been identified distributing trojanized versions of Zoom installers bundled with cryptocurrency mining...
A newly identified backdoor malware, Backdoor.Win32.DEVILSHADOW.THEAABO, has been discovered embedded in counterfeit Zoom installer packages. This threat...
A newly identified Mirai botnet variant (IoT.Linux.MIRAI.VWISI) has begun exploiting CVE-2020-10173, a command injection vulnerability in Comtrend...