Persistence is one of the key things for threat actors to maintain their access to compromised systems and establish connections whenever they require.
Threat actors operating with interests aligned to Belarus and Russia have been linked to a new cyber espionage campaign that likely exploited cross-site scripting (XSS) vulnerabilities in Roundcube webmail servers to target over 80 organizations.
A critical security flaw in the Bricks theme for WordPress is being actively exploited by threat actors to run arbitrary PHP code on susceptible installations.
Google and Mozilla this week released Chrome and Firefox software updates to resolve multiple vulnerabilities in both browsers, including high-severity memory safety bugs.
Bazel, an open-source software used for automation of building and testing, has been discovered with a critical supply chain vulnerability
What is the difference between Vulnerability Assessment and Penetration Testing?Vulnerability Assessment focuses on identifying and classifying vulnerabilities in a system, while Penetration Testing involves actively exploiting vulnerabilities to assess the real-world impact. How often should VAPT be conducted?The frequency of …
The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential harvesting to deliver its first-ever custom malware written in the Rust programming language.
New assessment focuses on how AI will impact the efficacy of cyber operations and the implications for the cyber threat over the next two years.
Remote desktop software maker AnyDesk disclosed on Friday that it suffered a cyber attack that led to a compromise of its production systems.
In 2024, an era where organisations and individuals increasingly operate online, the landscape of cybercrime is evolving rapidly. India, a burgeoning hub for fintech, has experienced a significant surge in cybercrime