North Korean state hackers start targeting the IT supply chain
North Korean-sponsored Lazarus hacking group has switched focus on new targets and was observed by Kaspersky security researchers expanding its supply…
North Korean-sponsored Lazarus hacking group has switched focus on new targets and was observed by Kaspersky security researchers expanding its supply…
Widespread malware campaigns are creating YouTube videos to distribute password-stealing trojans to unsuspecting viewers. [...]
A novel threat actor with unclear motives has been discovered running a crimeware campaign which delivers multiple Windows and Android RATs (remote…
Microsoft has asked system administrators to patch PowerShell 7 against two vulnerabilities allowing attackers to bypass Windows Defender Application Control (WDAC)…
Authored by Abdulrahman Alchemy CMS versions 2.x through 6.0.0 suffers from an arbitrary file upload vulnerability. Change Mirror Download #…
A recent phishing campaign targeting Coinbase users shows thieves are getting cleverer about phishing one-time passwords (OTPs) needed to complete…
Authored by Brandon Perry | Site metasploit.com Moodle allows an authenticated user to define spellcheck settings via the web interface.…
The NSA issued a technical advisory to warn organizations against the use of wildcard TLS certificates and the […] The…
Authored by LiquidWorm | Site zeroscience.mk Cypress Solutions CTM-200/CTM-ONE suffers from a hard-coded credential remote root vulnerability via telnet and…
Authored by LiquidWorm | Site zeroscience.mk Cypress Solutions CTM-200 wireless gateway version 2.7.1 suffers from an authenticated semi-blind OS command…