CISA has tagged another critical Ivanti security vulnerability, which can let threat actors create rogue admin…
Category: Cyber Attack
Hackers deploy AI-written malware in targeted attacks
In an email campaign targeting French users, researchers discovered malicious code believed to have been created…
Mallox Ransomware Targets Linux Systems with Modified Kryptina Code | Black Hat Ethical Hacking
The Mallox affiliate discovered by SentinelLabs exploited this leak, using Kryptina’s source code to develop a…
North Korean Hackers Deploy PondRAT via Poisoned Python Packages in Supply Chain Attacks | Black Hat Ethical Hacking
Once downloaded, these packages execute a second-stage payload that fetches the malware from a remote server,…
Is Tor Still Safe? Law Enforcement Exploits Highlight Timing Attack Vulnerabilities
Is Tor Still Safe? Law Enforcement Exploits Highlight Timing Attack Vulnerabilities Post Views: 230 Join our…
TeamViewer Confirms Security Breach by Russian Midnight Blizzard Group
TeamViewer reassures users after a security breach targeted an employee account. The company claims no customer…
Juniper releases out-of-cycle fix for max severity auth bypass flaw
Juniper Networks has released an emergency update to address a maximum severity vulnerability that leads to…
LAUSD Data Breach: Hackers Leak 25M Records, Including Student Locations
The Los Angeles Unified School District (LAUSD) has fallen victim to a significant data breach. A…
DISGOMOJI: New Linux Malware Uses Emojis for Command Execution | Black Hat Ethical Hacking
Unique C2 Mechanism: Discord and Emojis The malware was discovered when Volexity researchers found a UPX-packed…
AMD Investigates Potential Cyberattack Following Data Breach Claims on Hacking Forum | Black Hat Ethical Hacking
Potential Impact and Previous Incidents According to reports from DarkWebInformer, the data allegedly includes an employee…