Cybersecurity Blog
China-Linked Hackers Used ROOTROT Webshell in MITRE Network Intrusion
The MITRE Corporation has offered more details into the recently disclosed cyber attack, stating that the first evidence ...
Novel TunnelVision Attack Against Impacts Virtually All VPN Apps Through DHCP Server Manipulation
The TunnelVision attack is a newly discovered method that can compromise the security of most Virtual Private Network ...
New Case Study: The Malicious Comment
How safe is your comments section? Discover how a seemingly innocent ‘thank you’ comment on a product page ...
Google Simplifies 2-Factor Authentication Setup (It’s More Important Than Ever)
Google on Monday announced that it’s simplifying the process of enabling two-factor authentication (2FA) for users ...
Mastodon Delays Firm Fix to Solve Link Preview DDoS Issue
Mastodon delayed a firm fix for link preview DDoS issues, pushing it back to version 4.4.0 from the expected 4.3.0 ...
Russian Operator of BTC-e Crypto Exchange Pleads Guilty to Money Laundering
A Russian operator of a now-dismantled BTC-e cryptocurrency exchange has pleaded guilty to money laundering charges from ...
WordPress Plugin Exploit Impacts Over 90,000 Websites
The vulnerability, which has a CVSS score of 9.8, is a SQL injection flaw that allows attackers to execute unauthorized ...
Cuckoo Mac Malware Mimics Music Converter to Steals Passwords and Crypto
Cuckoo employs deceptive tactics, claiming to convert Spotify music to MP3 format while actually stealing sensitive data ...