Hackers Actively Exploit F5 BIG-IP Bug
The bug has a severe rating of 9.8, public exploits are released. Continue reading Hackers Actively Exploit F5 BIG-IP Bug
Collaborate Disseminate
The bug has a severe rating of 9.8, public exploits are released. Continue reading Hackers Actively Exploit F5 BIG-IP Bug
GitHub shared the timeline of breaches in April 2022, this timeline encompasses the information related to when a threat actor gained access and stole private repositories belonging to dozens of organizations. Continue reading Attacker Breach ‘Dozens’ of GitHub Repos Using Stolen OAuth Tokens
The Botnet appears to use a new delivery method for compromising Windows systems after Microsoft disables VBA macros by default. Continue reading Emotet is Back From ‘Spring Break’ With New Nasty Tricks
No government and customer data was accessed.
Continue reading Lapsus$ Hackers Target T-Mobile
Last year, Google Project Zero tracked a record 58 exploited-in-the-wild zero-day security holes. Continue reading Google: 2021 was a Banner Year for Exploited 0-Day Bugs
Citizen Lab uncovers multi-year campaign targeting autonomous region of Spain, called Catalonia. Continue reading ‘CatalanGate’ Spyware Infections Tied to NSO Group
In this time of unprecedented cyberwar, organizations must protect the personal digital lives of their executives in order to reduce the company’s risk of direct or collateral damage. Continue reading Protect Your Executives’ Cybersecurity Amidst Global Cyberwar
The APT28 (Advanced persistence threat) is operating since 2009, this group has worked under different names such as Sofacy, Sednit, Strontium Storm, Fancy Bear, Iron Twilight, and Pawn. Continue reading Microsoft Takes Down Domains Used in Cyberattack Against Ukraine
Demand for public Wi-Fi is on the rise. Usually free of charge, but there is a risk of expensive losses. Learn ways to protect yourself from cyber-threats. Continue reading Web Filtering and Compliances for Wi-Fi Providers
Demand for public Wi-Fi is on the rise. Usually free of charge, but there is a risk of expensive losses. Learn ways to protect yourself from cyber-threats. Continue reading Web Filtering and Compliances for Wi-Fi Providers