Nov 22, 2023NewsroomAuthentication Security / Windows A new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows
A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application developed
Nov 23, 2023NewsroomVulnerability / Cyber Threat An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE)
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals. But the bad
Nov 23, 2023NewsroomMalware / Threat Analysis Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader
Nov 23, 2023NewsroomMalware / Cyber Espionage A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to
Nov 24, 2023NewsroomCloud security / Data Protection Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put
Nov 24, 2023NewsroomCyber Attack / Malware Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called
Nov 24, 2023The Hacker NewsDeveloper Tools / API Security The title of this article probably sounds like the caption to
Nov 24, 2023NewsroomThreat Analysis / Dark Web More details have emerged about a malicious Telegram bot called Telekopye that’s used



