MHTML Exploited By APT Group Void Banshee
Security experts have uncovered a critical remote code execution (RCE) vulnerability, identified as CVE-2024-38112, within the MHTML protocol handler. This vulnerability,...
Security experts have uncovered a critical remote code execution (RCE) vulnerability, identified as CVE-2024-38112, within the MHTML protocol handler. This vulnerability,...
MuddyWater, an Iranian threat group, has recently started using a new, tailor-made backdoor to attack IT systems in the Middle...
Google is planning what could be the biggest acquisition in the firm’s history, according to reports.The tech giant is in...
Cybercriminals are abusing legitimate URL protection services to disguise malicious phishing links, Barracuda researchers have revealed.The firm observed phishing campaigns...
Security researchers have found a new vulnerability in the Backup and Staging by WP Time Capsule plugin, affecting versions 1.22.20...
Rite Aid has become the latest high street name to fall victim to ransomware actors, after it revealed a “limited”...
The Sysdig Threat Research Team (TRT) has revealed significant developments in the activities of the SSH-Snake threat actor. The group, now...
For this week's cyber security tip, we delve into a crucial aspect of responding to cyber threats: forensic analysis. Forensic...
A County in Indiana, US, has filed a disaster declaration following a ransomware attack on local government networks, which has...
Telecommunications giant AT&T has revealed that customer data has been illegally downloaded by threat actors.Hackers have downloaded the data from...
A leading US car parts provider has revealed that a high-profile data breach earlier in 2024 will impact over two...
NATO’s members have agreed to the construction of a new cyber-defense facility designed to help the military alliance build resilience...
The number of successful ransomware attacks advertised on leak sites increased 9% year-on-year (YoY) in the first quarter of 2024...
The US government has urged software manufacturers to work towards the elimination of operating system (OS) command injection vulnerabilities.The alert...
A broad network of 708 fraudulent web domains is being used to sell fake sporting and musical events tickets, primarily...
Cryptocurrency investigators have claimed a popular online marketplace in South-East Asia is actually being used primarily by money launderers and...
Phishing attacks continue to be one of the most prevalent and dangerous cyber threats facing individuals and organizations today. In...
Almost three-quarters (73%) of cybersecurity professionals have used unsanctioned apps including AI in the past year, according to a new...
Sysadmins have a busy time ahead this month after Microsoft issued updates for over 140 CVEs, including four zero-day vulnerabilities.The...
Russian state-sponsored media organization RT, formerly Russia Today, has used AI-powered software to create authentic-looking social media personas en masse...
Ransomware attackers are applying a significant focus on defense evasion tactics to increase dwell time in victim networks, according to...
Security researchers have uncovered a critical vulnerability, CVE-2024-38021, affecting most Microsoft Outlook applications. This zero-click remote code execution (RCE) vulnerability, now...
A recent surge in fraudulent smishing attacks impersonating India Post, the government-operated postal system, has prompted warnings from Indian authorities...
Ensuring that every single device connected to your network is secure is crucial in today’s cyber threat landscape. This week,...