All posts tagged "cybersecurity"
-
Security
/ 1 week agoCisco Confirms Active Attacks Exploiting SD-WAN Manager Flaws
Cisco Systems has confirmed that two security vulnerabilities in its Catalyst SD-WAN Manager software are now being actively exploited by attackers....
-
Security
/ 2 weeks agoCISA Adds VMware Flaw to Exploited Vulnerabilities List
The U.S. cybersecurity and Infrastructure Security Agency (CISA) added a high-severity security vulnerability in VMware Aria Operations to its Known Exploited...
-
Security
/ 2 weeks agoAPT41-Linked Silver Dragon Targets Governments with Cobalt Strike
cybersecurity researchers have disclosed details of an advanced persistent threat group, dubbed Silver Dragon, which has been linked to cyber attacks...
-
Security
/ 2 weeks agoMalicious Laravel Packages on Packagist Spread Cross-Platform RAT
cybersecurity researchers have identified a series of malicious packages within the official Packagist repository for PHP, posing as legitimate Laravel utilities...
-
Security
/ 2 weeks agoHacktivist DDoS Attacks Surge After Middle East Conflict
cybersecurity researchers have reported a significant spike in retaliatory cyberattacks following recent military actions in the Middle East. Between February 28...
-
Security
/ 2 weeks agoFake Tech Support Spam Deploys Havoc C2 in New Campaign
Security researchers have identified a new campaign where threat actors are impersonating IT support staff to deploy a powerful command-and-control framework...
-
Security
/ 2 weeks agoSloppyLemming Hackers Target Pakistan, Bangladesh Governments
A cyber threat group known as SloppyLemming has been linked to a new campaign targeting government bodies and critical infrastructure operators...
-
Security
/ 2 weeks agoMicrosoft Warns of OAuth Phishing Targeting Government Entities
Microsoft issued a public warning on Monday regarding sophisticated phishing campaigns that are successfully bypassing standard email and browser security measures....
-
Security
/ 2 weeks agoNew Phishing Suite Bypasses MFA Using Reverse Proxy
cybersecurity researchers have identified a new and sophisticated phishing platform that is being used to circumvent multi-factor authentication protections. The toolkit,...
-
Security
/ 2 weeks agoAI Agents Emerge as Unmanaged Enterprise Force
A new class of powerful, autonomous artificial intelligence systems is rapidly being deployed within corporate environments, often operating outside of traditional...

