HP researchers are reporting Attackers Disguise RedLine Stealer as a Windows 11 Upgrade. Windows 10 users are being duped into…
Browsing: Malware and Vulnerabilities
The 2020s are making a name for themselves as the decade of API attacks. In February 2021, for example, Dark…
Breaking story – Analysts at Sancec have found the source of a mass breach of over 500 e-commerce stores running…
Express VPN is challenging researchers to crack into their TrustedServer challenging researchers to crack into their TrustedServer system with a…
Since 1989, after Russia ceased military operations in the Afghanistan conflict, there was a period of reflection and soul searching…
Following the news that Microsoft took the decision to disable macros in Office docs by default after years of calls…
DHS Launches First-Ever Cyber Safety Review Board. The 15-member group will focus on significant cybersecurity events and recommend improvements. The…
On the 23 of February 2022, I am presenting a webinar to an international audience titled, ‘Don’t look back in…
A major vulnerability has been found in Argo CD, an open-source developer tool for Kubernetes. In response to this news, cyber…
The Cybereason Nocturnus Team discuss PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage. They observed an uptick…