Cybersecurity Blog
Report: 99% of IoT Exploitation Attempts Rely on Previously Known CVEs
The expanding attack surface, with over 15 billion connected devices worldwide, raises concerns about privacy breaches ...
Pro-Bangladeshi Hacktivists Enter Global Stage with Matryoshka 424 Alliance
Team ARXU gained recognition earlier this year for targeting Romania over its support for Israel. The hacker group has a ...
Infostealing Malware Masquerading as Generative AI Tools
Information-stealing malware families have evolved to impersonate generative AI tools, with examples like GoldPickaxe ...
GootLoader is Still Active and Efficient
The malware has evolved into multiple versions, with GootLoader 3 being the latest one in use. Despite updates to the ...
Critical Unpatched Flaws Disclosed in Popular Gogs Open-Source Git Service
Four unpatched security flaws, including three critical ones, have been disclosed in the Gogs open-source, self-hosted ...
Apple Removes VPN Apps from Russian App Store Amid Government Pressure
Apple removed a number of virtual private network (VPN) apps in Russia from its App Store on July 4, 2024, following a ...
Latest Ghostscript Vulnerability Haunts Experts as the Next Big Breach Enabler
The vulnerability could be exploited to compromise systems without requiring user interaction, contrary to some severity ...
New Eldorado Ransomware Targets Windows, VMware ESXi VMs
Eldorado also encrypts network shares using the SMB protocol, deletes shadow volume copies, and skips certain file types ...