Cybersecurity Blog
Google Fixed Actively Exploited Android Privilege Escalation Flaw (CVE-2024-32896)
Google has patched a high-severity vulnerability, known as CVE-2024-32896, in its Android OS actively exploited in the ...
Revival Hijack Attack Puts 22,000 PyPI Packages at Risk of Hijack
This method could potentially lead to numerous malicious package downloads. The attack involves hijacking popular ...
CISA Warns of Three Actively Exploited Vulnerabilities That Demand Immediate Attention
Two vulnerabilities, CVE-2021-20123 and CVE-2021-20124, pose serious risks for Draytek VigorConnect routers, potentially ...
RomCom Group’s Underground Ransomware Exploits Microsoft Zero-Day Flaw
A new ransomware variant named Underground, linked to the Russia-based RomCom group, encrypts files on victims’ Windows ...
U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown
The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 32 internet domains used by a pro-Russian ...
NIST Cybersecurity Framework (CSF) and CTEM – Better Together
It’s been a decade since the National Institute of Standards and Technology (NIST) introduced its Cybersecurity ...
FBI Warns Crypto Firms of Aggressive Social Engineering Attacks
The FBI issued a warning about aggressive social engineering attacks by North Korean hacking groups targeting ...
Threat Actors Using MacroPack to Deploy Brute Ratel, Havoc, and PhantomCore Payloads
Malicious actors potentially utilized the MacroPack red-teaming framework to distribute harmful payloads like Brute ...