Cybersecurity Blog
CISA adds Cisco NX-OS Command Injection bug to its Known Exploited Vulnerabilities catalog
The flaw allows an attacker to execute arbitrary commands as root on the affected device’s operating system. Only ...
Cybersecurity Agencies Warn of China-linked APT40’s Rapid Exploit Adaptation
Cybersecurity agencies from Australia, Canada, Germany, Japan, New Zealand, South Korea, the U.K., and the U.S. have ...
Trojanized jQuery Packages Found on npm, GitHub, and jsDelivr Code Repositories
Unknown threat actors have been found propagating trojanized versions of jQuery on npm, GitHub, and jsDelivr in what ...
New APT Group “CloudSorcerer” Targets Russian Government Entities
A previously undocumented advanced persistent threat (APT) group dubbed CloudSorcerer has been observed targeting ...
Dark Web Malware Logs Expose 3,300 Users Linked to Child Abuse Sites
An analysis of information-stealing malware logs published on the dark web has led to the discovery of thousands of ...
Indian Government Issues Serious Warning on Phishing Scams Alleging Sexual Offenses
The emails falsely accuse recipients of sexual offences, using names and seals of authorities to appear authentic. ...
New Ransomware-as-a-Service ‘Eldorado’ Targets Windows and Linux Systems
An emerging ransomware-as-a-service (RaaS) operation called Eldorado comes with locker variants to encrypt files on ...
Decryptor for DoNex, Muse, DarkRace, (fake) LockBit 3.0 Ransomware Released
Avast researchers have identified a cryptographic weakness in the DoNex ransomware and its previous versions, enabling ...