cyber security
-
Read moreA serious vulnerability in IBM Backup, Recovery, and Media Services (CVE-2025-33108) could allow attackers to escalate privileges and execute malicious code. Learn about the risks and mitigation steps.
-
Read moreCybercriminals are increasingly abusing the open-source EDRSilencer tool to tamper with Endpoint Detection and Response (EDR) solutions and conceal their malicious activities. This tool uses the Windows Filtering Platform (WFP) to block security software from communicating, making it harder for organizations to detect and remove malware.
-
Read moreRobert Westbrook, a 39-year-old U.K. national, has been charged by the U.S. Department of Justice for allegedly orchestrating a hack-to-trade fraud scheme that netted him approximately $3.75 million in illegal profits by exploiting hacked Microsoft 365 executive emails.
-
Read moreA dangerous new variant of the RomCom malware, dubbed 'SnipBot', has been spotted in sophisticated data theft attacks. Researchers from Palo Alto Networks' Unit 42 discovered this enhanced version, marking it as RomCom 5.0, and highlighting its ability to steal sensitive data from compromised systems while pivoting on networks to extend the attack.
-
Posted: September 01, 2023Views: 1969Read moreThe recent news of hackers using OTP APIs for SMS bombing and 44 Indian APIs being exposed is a matter
-
Posted: March 11, 2023Views: 30Read moreData breaches have become a major concern in the digital age, and the latest report by Risk Based Security, a