gurushyam.mony October 21, 2024 No Comments GitHub, Telegram Bots, and ASCII QR Codes Abused in New Wave of Phishing Attacks
gurushyam.mony October 21, 2024 No Comments OilRig Exploits Windows Kernel Flaw in Espionage Campaign Targeting UAE and Gulf
gurushyam.mony October 21, 2024 No Comments Critical Veeam Vulnerability Exploited to Spread Akira and Fog Ransomware
gurushyam.mony October 21, 2024 No Comments THN Cybersecurity Recap: Top Threats, Tools and Trends (Oct 7 – Oct 13)
gurushyam.mony October 21, 2024 No Comments Supply Chain Attacks Can Exploit Entry Points in Python, npm, and Open-Source Ecosystems
gurushyam.mony October 21, 2024 No Comments 5 Steps to Boost Detection and Response in a Multi-Layered Cloud
gurushyam.mony October 21, 2024 No Comments WordPress Plugin Jetpack Patches Major Vulnerability Affecting 27 Million Sites
gurushyam.mony October 21, 2024 No Comments Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration
gurushyam.mony October 21, 2024 No Comments Researchers Uncover Hijack Loader Malware Using Stolen Code-Signing Certificates
gurushyam.mony October 21, 2024 No Comments China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns