News
Researchers have known for almost a decade that threat actors sometimes use DNS records to host malicious PowerShell scripts.
Storm-2603 exploits SharePoint flaws to deploy Warlock ransomware, affecting 400+ victims. Microsoft urges mitigation.
A new attack uses CVE-2021-41773 in Apache HTTP Server to install a cryptocurrency miner via compromised websites.
Zero-day exploits are the ghosts in the machine, silent, invisible, and devastating when they finally make themselves known.
The name was coined by Dinh Ho Anh, a researcher from Khoa of Viettel Cyber Security, who developed the exploit. The ...
A hacker has been using a backdoor to exploit certain SonicWall SMA appliances since October 2024. Google’s Threat ...
Wiz believes the active campaign is part of a broader crypto-scam infrastructure, which uses a wide range of exploitation ...
From 2015 to 2018, she was Deputy National Intelligence Officer for Russia and Eurasia at the National Intelligence Council.
Multiple Fortinet FortiWeb instances recently infected with web shells are believed to have been compromised using public ...
Hackers are exploiting a zero-day vulnerability in CrushFTP to gain administrative privileges on vulnerable servers via HTTPS ...
On Thursday, Fortinet released an update for FortiWeb. Exploits have emerged that abuse the critical gap.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results