Analysis and Config Extraction of Lu0Bot, a Node.js Malware with Considerable Capabilities

Nowadays, more malware developers are using unconventional programming languages to bypass advanced detection systems. ...

Guyana Governmental Entity Hit by DinodasRAT in Cyber Espionage Attack

Oct 05, 2023NewsroomCyber Espionage / Cyber Threat A governmental entity in Guyana has been targeted as part of a ...

Google and Yahoo say they will crack down on spam with new measures

Two of the world’s largest email providers said Tuesday that they will take several new steps to rein in bulk senders ...

New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks

Server and computer hardware giant Supermicro has released updates to address multiple vulnerabilities in Baseboard ...

GoldDigger Android Trojan Targets Banking Apps in Asia Pacific Countries

Oct 05, 2023NewsroomMobile Security / crypto A new Android banking trojan named GoldDigger has been found targeting ...

Okta Buys Personal Password Manager Uno to Service Consumers

Identity & Access Management , Multi-factor & Risk-based Authentication , Security Operations Uno’s Design ...

Cisco Fixes Hardcoded Root Credentials in Emergency Responder

The vulnerability, which affects CER version 12.5(1)SU4, could be exploited to execute arbitrary commands as the root ...

CISA Warns of Active Exploitation of JetBrains and Windows Vulnerabilities

Oct 05, 2023NewsroomVulnerability / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on ...

1 580 581 582 583 584 585 586 587 588 589 590 656