Cybersecurity Blog
Analysis and Config Extraction of Lu0Bot, a Node.js Malware with Considerable Capabilities
Nowadays, more malware developers are using unconventional programming languages to bypass advanced detection systems. ...
Guyana Governmental Entity Hit by DinodasRAT in Cyber Espionage Attack
Oct 05, 2023NewsroomCyber Espionage / Cyber Threat A governmental entity in Guyana has been targeted as part of a ...
Google and Yahoo say they will crack down on spam with new measures
Two of the world’s largest email providers said Tuesday that they will take several new steps to rein in bulk senders ...
New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
Server and computer hardware giant Supermicro has released updates to address multiple vulnerabilities in Baseboard ...
GoldDigger Android Trojan Targets Banking Apps in Asia Pacific Countries
Oct 05, 2023NewsroomMobile Security / crypto A new Android banking trojan named GoldDigger has been found targeting ...
Okta Buys Personal Password Manager Uno to Service Consumers
Identity & Access Management , Multi-factor & Risk-based Authentication , Security Operations Uno’s Design ...
Cisco Fixes Hardcoded Root Credentials in Emergency Responder
The vulnerability, which affects CER version 12.5(1)SU4, could be exploited to execute arbitrary commands as the root ...
CISA Warns of Active Exploitation of JetBrains and Windows Vulnerabilities
Oct 05, 2023NewsroomVulnerability / Cyber Attack The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on ...