Vulnerabilities

CISA Adds SolarWinds WHD Bug to Exploited Vulnerabilities Catalog
Malware & Threats CISA Adds SolarWinds WHD Bug to Exploited Vulnerabilities Catalog

The cybersecurity landscape is ever-evolving, with both defenders and attackers continually escalating their tactics. Recent developments have emphasized the importance of addressing critical vulnerabilities promptly to mitigate risks. One such significant update comes from the Cybersecurity and

Can EDRSilencer Be Stopped by Modern Cybersecurity Measures?
Security Operations & Management Can EDRSilencer Be Stopped by Modern Cybersecurity Measures?

The alarming trend of malicious actors repurposing legitimate red team tools, such as EDRSilencer, poses significant challenges to the cybersecurity landscape. Originally created to help security professionals test defenses, EDRSilencer is now being used to bypass endpoint detection and response

Balancing Security and Innovation: DevSecOps Challenges for Developers
Infrastructure & Network Security Balancing Security and Innovation: DevSecOps Challenges for Developers

Within the increasingly complex software development landscape, security concerns have become more than just a peripheral obligation. Developers are now dedicating a substantial portion of their time and energy to security-related tasks, a trend that has implications both for productivity and for

Are EV Chargers Vulnerable to Cyber Attacks? Here's What We Found Out
Data Protection & Privacy Are EV Chargers Vulnerable to Cyber Attacks? Here's What We Found Out

The growing adoption of electric vehicles (EVs) has catalyzed a corresponding expansion in EV charging infrastructure, making the security of these systems a focal point of concern. Recent revelations by cybersecurity experts McCaulay Hudson and Alex Plaskett at the 44CON conference in London

Urgent Alert: Encrypt Persistence Cookies to Thwart Cyber Attacks
Infrastructure & Network Security Urgent Alert: Encrypt Persistence Cookies to Thwart Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has recently raised alarms about active cyber-attacks exploiting unencrypted persistence cookies managed by the F5 BIG-IP Local Traffic Manager module. Malicious actors are leveraging these vulnerabilities to identify and exploit

How Do OilRig Hackers Exploit Microsoft Exchange for Espionage?
Infrastructure & Network Security How Do OilRig Hackers Exploit Microsoft Exchange for Espionage?

In the interconnected digital world, the OilRig hacking group has emerged as a significant cyber threat, particularly concerning their exploitation of Microsoft Exchange servers. This article explores the sophisticated methods employed by this Iranian-linked Advanced Persistent Threat (APT) group

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later