New Botnet Discovered Exploiting Critical VMware Vulnerability
New Botnet Discovered Exploiting Critical VMware Vulnerability The critical VMware vulnerability with code CVE-2022-22954 was discovered to be used by threat actors for remote code execution in botnet...
Critical Vulnerability in Zyxel Firewall and VPN Products Exploited
Critical Vulnerability in Zyxel Firewall and VPN Products Exploited Threat actors exploit the critical vulnerability affecting Zyxel’s firewall and VPN devices. The vulnerability allows attacker...
BPFdoor Malware Targets Linux Systems Unnoticed for Five Years
BPFdoor Malware Targets Linux Systems Unnoticed for Five Years It turned out that the backdoor malware called BPFdoor, which cybersecurity researchers recently discovered, has been targeting Linux and...
10GB Database of Popular VPN Apps Leaked
10GB Database of Popular VPN Apps Leaked Threat actors shared a 10GB database allegedly belonging to popular VPN apps such as SuperVPN, GeckoVPN, and ChatVPN companies in a Telegram group. The databas...
Microsoft May 2022 Patch Tuesday: Three Zero-Days Total 75 Vulnerabili...
Microsoft May 2022 Patch Tuesday: Three Zero-Days Total 75 Vulnerabilities Fixed Microsoft has released the May 2022 Patch Tuesday. The patches fix three zero-day vulnerabilities, one of which is...
Critical Azure Vulnerability Creates a Massive Attack Surface
Critical Azure Vulnerability Creates a Massive Attack Surface Microsoft has released patches for a vulnerability that affects Azure Synapse and Azure Data Factory products, allowing threat actors to R...
Critical BIG-IP iControl REST Vulnerability Allows Arbitrary Code Exec...
Critical BIG-IP iControl REST Vulnerability Allows Arbitrary Code Execution A critical vulnerability discovered by F5 on May 4 allows threat actors to bypass iControl REST authentication. The flaw whi...
Why do Companies Need Cybersecurity?
Why do Companies Need Cybersecurity? Cybersecurity encompasses all technologies and techniques that ensure the integrity of computer systems and electronic data. And, at an age where more and more of ...
Critical Vulnerability in WSO2 Products Could Allow RCE
Critical Vulnerability in WSO2 Products Could Allow RCE It turned out that a critical vulnerability that affects the products of WSO2 and enables RCE has been actively exploited. WSO2 has a wide portf...
Top 10 Cyber Security Awareness Days Worldwide
Top 10 Cyber Security Awareness Days Worldwide Cyber security awareness is the sine qua non of working life for both individual and corporate users. Everyone must follow certain practices from head to...
T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code
T-Mobile Confirms Lapsus$ Extortion Group Breached its Source Code Telecommunications company T-Mobile confirmed that the Lapsus$ extortion group had accessed the company’s internal systems...
Atlassian Patches Jira Authentication Bypass Vulnerability
Atlassian Patches Jira Authentication Bypass Vulnerability Atlassian has released a security advisory announcing a critical authentication bypass vulnerability in Seraph, the company’s web frame...
Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue
Critical RCE Vulnerability in Microsoft RPC Could Be a Big Issue The critical RCE vulnerability in the Microsoft RPC (Remote Procedure Call) communication protocol raises concerns among cybersecurity ...
IBM X-Force: Now Threat Actors are Faster and Hard to Detect
IBM X-Force: Now Threat Actors are Faster and Hard to Detect Over the last two years, our world has undergone a transformation that we never expected. New business models and ways of working have chan...
Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulner...
Microsoft April 2022 Patch Tuesday Fixes 2 Zero-Days and 10 RCE Vulnerabilities Microsoft released 119 patches on April 2022 Patch Tuesday that fixed two zero-days and 10 critical RCE vulnerabilities....
Is Nginx Zero-Day RCE Vulnerability False Alarm?
Is Nginx Zero-Day RCE Vulnerability False Alarm? On Saturday, April 9, it was announced that there was a zero-day RCE vulnerability for webserver Nginx version 1.18 in the post made from the Twit...
Android Banking Malware Octo Allows Remote Control on Infected Devices
Android Banking Malware Octo Allows Remote Control on Infected Devices A banking trojan Octo has been discovered, downloaded from the Google Play Store, and targeting banks and financial institutions....
Most Remarkable APT Incidents That Targeted Malaysia in 2021
Most Remarkable APT Incidents That Targeted Malaysia in 2021 Malaysia has rapidly integrated into the digital age with the rest of the world for the past few decades because of the exponential develop...
Most Remarkable APT Incidents That Targeted Netherlands in 2021
Most Remarkable APT Incidents That Targeted Netherlands in 2021 The Netherlands is regarded as the technological gateway to Europe. The internet economy in the Netherlands, which currently accounts fo...
What are the Biggest Cybersecurity Risks in North America?
What are the Biggest Cybersecurity Risks in North America? The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of...