Cybersecurity experts have identified a critical zero-day vulnerability in Pulse Connect Secure VPN, a widely used virtual private network solution. The vulnerability, which allows for remote code execution (RCE), has been actively exploited by hackers, raising significant concerns among organizations relying on …
Cybersecurity professionals at Sygnia have noted a notable change in the strategies used by ransomware groups that are aiming at virtualized environments, specifically VMware ESXi infrastructure, in relation to development. The incident response team has noted a steady increase in …
A threat actor has claimed to have gained unauthorized access to API keys for major cloud service providers, including Amazon Web Services (AWS), Microsoft Azure, MongoDB, and GitHub. The announcement was made via a post on the social media platform X by …
Rockwell Automation has sent an urgent message to all of its customers because of rising geopolitical issues and hostile cyber activity worldwide. The company is asking that any devices currently connected to the public internet be checked out immediately and shut …
A new piece of malware called CasperSecurity Stealer is a major threat to Windows computers. This complex malware is made to steal Remote Desktop Protocol (RDP) credentials, which is very dangerous for individuals and businesses. A New Breed of Malware CasperSecurity Stealer …
The Insikt Group at Recorded Future has found a sophisticated cybercrime operation run by Russian-speaking threat actors from the Commonwealth of Independent States (CIS). This group of hackers has used safe websites like GitHub and FileZilla to spread banking malware, which …
“Encrypted DNS Implementation Guidance,” a detailed document from the Cybersecurity and Infrastructure Security Agency (CISA), tells government agencies how to improve their cybersecurity by using encrypted Domain Name System (DNS) protocols. This advice is in line with Memorandum M-22-09 from …
Earth Hundun, a notable Asia-Pacific malware organization, uses Waterbear and Deuterbear. We first encountered Deuterbear in Earth Hundun’s arsenal in October 2022, signaling its implementation. This report describes the ultimate Remote Access Trojan (RAT) we recovered from a C&C server from an …
Cybersecurity experts have identified a new malware, dubbed WaveStealer, that is being actively distributed through popular messaging platforms Telegram and Discord. This sophisticated malware masquerading as video game installers poses a significant threat to users by targeting their sensitive data. How WaveStealer …
According to the Federal Communications Commission (FCC), the Royal Tiger Group and its employees are a Consumer Communications Information Services Threat (C-CIST). This is a crucial step for the FCC in its ongoing work to protect U.S. customers from sophisticated …










