Cybersecurity Blog
New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys
Android device users in South Korea have emerged as a target of a new mobile malware campaign that delivers a new type ...
Red Hat Issues Critical Patch for Pulpcore Authentication Bypass Flaw (CVE-2024-7923)
Red Hat has issued a critical security advisory for an authentication bypass vulnerability (CVE-2024-7923) in Pulpcore, ...
TIDRONE Espionage Group Targets Taiwan Drone Makers in Cyber Campaign
A previously undocumented threat actor with likely ties to Chinese-speaking groups has predominantly singled out drone ...
U.S. Offers $10 Million for Info on Russian Cadet Blizzard Hackers Behind Major Attacks
The U.S. government and a coalition of international partners have officially attributed a Russian hacking group tracked ...
BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
The BlindEagle APT group has recently targeted the Colombian insurance sector. The attack chain starts with a phishing ...
Veeam Backup & Replication Faces RCE Flaw Allows Full System Takeover
A critical Remote Code Execution (RCE) flaw, CVE-2024-40711, with a CVSS score of 9. 8 has been discovered in Veeam ...
Apache fixes critical OFBiz remote code execution vulnerability
Apache has addressed a critical remote code execution vulnerability in its OFBiz software, which could allow attackers ...
Fog Ransomware Now Targeting the Financial Sector
Fog, a variant of STOP/DJVU family, targets various sectors, exploiting VPN vulnerabilities to infiltrate network ...