The Food and Drug Administration (FDA) and the US Cybersecurity and Infrastructure Security Agency (CISA) have issued an advisory concerning serious security vulnerabilities in…
General
State-sponsored hackers use Microsoft’s ‘Follina’ bug to target entities in Europe and the United States
A suspected state-aligned threat actor has been linked to a new wave of attacks targeting government entities in Europe and the United States using…
Evasive phishing employs reverse tunnels and URL shortening services
Researchers are seeing an increase in the use of reverse tunnel services, as well as URL shorteners, for large-scale phishing campaigns, making the malicious…
Spam campaign using SVCReady malware
A new phishing campaign using SVCReady, a known malware, has been observed. “The malware is notable for the unusual way it is delivered to…
Critical flaw was found inside the UNISOC smartphone chip
Check Point Research was the one who found the flaw. UNISOC handles 11% of all smartphones in the globe. Check Point Research has discovered…
Bored Ape Yacht club hacked third time this year
Threat actors took over Bored Ape Yacht Club (BAYC) for the third time this year. They have stolen and sold NFTs worth $250,000 or…
Foxconn confirms ransomware attack halted the production in Mexico
A ransomware attack on one of Foxconn’s Mexico-based production factories occurred in late May, according to the electronics maker. The organisation could not offer…
Researchers discover Malware controlling thousands of websites in the Parrot TDS network
The Parrot traffic direction system(TDS), which was reported earlier this year, had a more profound impact than thought before, research stated. Since February 2019,…
Conti leaks point to ransomware groups’ interest in firmware attacks
Earlier this year, a study of leaked chats of the infamous Conti ransomware group suggests that the syndicate has been working on a set…
Multiple Vulnerabilities are discovered In Open Automation Software (OAS) Platform
Open Automation Software, a major ICS platform, has a number of security flaws, according to researchers (OAS). Exploiting these flaws could lead to the…