A critical RCE flaw in Horde Webmail has yet to be addressed
A remote code execution vulnerability in the open-source Horde Webmail client can allow to take over servers by sending a...
A remote code execution vulnerability in the open-source Horde Webmail client can allow to take over servers by sending a...
1977 was quite the year. Led Zeppelin! Jimmy Carter! Saturday Night Fever! We can now add “a ransomware attack” to...
More and more Americans have been falling victim to phone scams since 2019. According to the latest report from Truecaller...
German ISPs are considering the introduction of TrustPid, a new type of “supercookie” that comprises of a unique identifier which...
A new version of the XLoader botnet is implementing a new technique to obscure the Command and Control infrastructure. Researchers...
If you’re an SMB, chances are that you’re already well-aware of the fact that cyber threats can wreak havoc on...
Today we took a look at a phishing mail pinning its hopes on a QR code linking to a bogus...
On Monday May 30, 2022, Microsoft issued CVE-2022-30190, a new vulnerability ‘Follina’ already being exploited in the wild (zero-day) via malicious...
Researchers uncovered 3.6M accessible MySQL servers worldwide that represent a potential attack surface for their owners. Researchers from Shadow Server scanned the...
In a short post on LinkedIn Rahul Sasi, founder and CEO of CloudSEK, explains how WhatsApp account takeovers are possible....
A China-linked APT group is actively exploiting the recently disclosed Follina zero-day flaw in Microsoft Office in attacks in the wild. China-linked...
Costa Rican Social Security Fund, Costa Rica ‘s public health service, was hit by a Hive ransomware attack. Costa Rican...
Explore the latest findings from Trend Micro’s Cyber Risk Index (2H’2021) and how to better manage people to minimize cyber...
Users of WSO2 products are advised to update their respective products and platforms or to apply the temporary mitigation steps...
Cybersecurity is an industry known for many hats: white hats, black hats, and grey hats. White hats refer to “the...
A Runescape-themed missive landed in our email inbox today, claiming action is required to secure our account. The malicious email...
The FBI is warning academics to be on their guard, as an embattled education sector continues to experience attacks and...
SideWinder, an aggressive APT group, is believed to have carried out over 1,000 attacks since April 2020, Kaspersky reported. Researchers...
“Beam me up Scotty” will always remain my first association with teleportation. And as it stands now, we are still...
Microsoft released workarounds for a recently discovered zero-day vulnerability, dubbed Follina, in the Microsoft Office productivity suite. Microsoft has released workarounds for...
Cyber Research Labs reported a rise in ransomware attacks in the second quarter of 2022, small states are more exposed...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Interpol arrested three Nigerian men in Lagos, who are suspected of using the Agent Tesla RAT to reroute financial transactions...
Several researchers have come across a novel attack that circumvents Microsoft’s Protected View and anti-malware detection. The attack vector uses...