Fortinet FortiWeb Fabric Connector Vulnerability Exploited to Execute Remote Code5 days agoBy Guru BaranMore
New Forensic Technique Uncovers Hidden Trails Left by Hackers Exploiting Remote Desktop Protocol2 days agoBy Guru BaranMore
Microsoft Confirms Teams Outage for Users, Investigation Underway - Updated7 days agoBy Guru BaranMore
MITRE Launches AADAPT Framework for Detecting and Responding to Digital Asset Management AttacksYesterdayBy Guru BaranMore
Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation6 days agoBy Guru BaranMore
BaitTrap – 17,000+ Fake News Websites Caught Promoting Investment Frauds12 hours agoBy Tushar Subhra DuttaMore
Apache Tomcat Coyote Vulnerability Let Attackers Trigger DoS Attack21 hours agoBy Tushar Subhra DuttaMore
SquidLoader Using Sophisticated Malware With Near-Zero Detection to Swim Under Radar1 hour agoBy Tushar Subhra DuttaMore
Authorities Dismantled “Diskstation” Ransomware Attacking Synology NAS Devices Worldwide7 hours agoMore
Google's AI Tool Big Sleep Uncovered Critical SQLite 0-Day Vulnerability and Blocks Active Exploitation2 hours agoBy Guru BaranMore
Symantec Endpoint Management Suite Vulnerability Allows Malicious Code Execution RemotelyYesterdayBy Guru BaranMore
CBI Busts Noida Based Tech Support Scam Targeting UK & Australian CitizensYesterdayBy Tushar Subhra DuttaMore
Vim Command Line Text Editor Vulnerability Let Attackers Overwrite Sensitive Files4 hours agoBy Guru BaranMore
Oracle Critical Security Update - 309 Vulnerabilities with 145 Remotely Exploitable Patched3 hours agoBy Guru BaranMore
New Attack Targeting Japanese Companies Exploiting Ivanti & Fortinet VPN Vulnerabilities6 hours agoBy Tushar Subhra DuttaMore
VMware ESXi and Workstation Vulnerabilities Let Attackers Execute Malicious Code on Host9 hours agoBy Guru BaranMore
Threat Actors Use Sophisticated Hacking Tools to Destroy Organizations Critical Infrastructure2 days agoBy Tushar Subhra DuttaMore
Microsoft Details on How Security Copilot in Intune and Entra Helps Security and IT Teams7 hours agoBy Tushar Subhra DuttaMore
Windows Server 2025 Golden dMSA Attack Enables Authentication Bypass and Password Generation1 hour agoBy Guru BaranMore
Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems19 hours agoBy Tushar Subhra DuttaMore
Node.js Vulnerabilities Exposes Windows App to Path Traversal and HashDoS Attacks7 hours agoBy Guru BaranMore
Gmail Message Used to Trigger Code Execution in Claude and Bypass Protections2 hours agoBy Guru BaranMore
NCSC Urges Organizations to Upgrade Microsoft Windows 11 to Defend Cyberattacks21 hours agoBy Tushar Subhra DuttaMore
Dark 101 Ransomware With Weaponized .NET Binary Disables Recovery Mode and Task Manager7 hours agoBy Tushar Subhra DuttaMore
Hackers Leveraging AWS Lambda URLs Endpoints to Attack Governments OrganizationsYesterdayBy Tushar Subhra DuttaMore
Octalyn Stealer Steals VPN Configurations, Passwords and Cookies in Structured Folders10 hours agoBy Tushar Subhra DuttaMore
Konfety Android Malware on Google Play Uses ZIP Manipulation to Imitate Legitimate AppsYesterdayBy Guru BaranMore
KongTuke Attacking Windows Users With New Interlock RAT Variant Using FileFix Technique2 days agoBy Tushar Subhra DuttaMore
RenderShock 0-Click Vulnerability Executes Payloads via Background Process Without User Interaction2 days agoBy Guru BaranMore
Microsoft Details on Fixing Error “Identify Which Process Is Blocking a File in Windows” With Built-in...2 days agoBy Guru BaranMore
Gigabyte UEFI Firmware Vulnerability Let Attackers Execute Arbitrary Code in the SMM Environment2 days agoMore
Google Gemini for Workspace Vulnerability Lets Attackers Hide Malicious Scripts in Emails3 days agoBy Guru BaranMore
CISA Releases 13 New Industrial Control Systems Surrounding Vulnerabilities and Exploits5 days agoBy Tushar Subhra DuttaMore
FBI Atlanta Seizes Major Video Game Piracy Websites in International Operation5 days agoBy Guru BaranMore
Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors5 days agoBy Tushar Subhra DuttaMore
Microsoft Eliminated High-Privilege Access to Enhance Microsoft 365 Security4 days agoBy Tushar Subhra DuttaMore