by Beck Bailey | Apr 24, 2024 | RSS
A new malware campaign has been exploiting the updating mechanism of the eScan antivirus software to distribute backdoors and cryptocurrency miners like XMRig through a long-standing threat codenamed GuptiMiner targeting large corporate networks. Cybersecurity firm...
by Beck Bailey | Apr 24, 2024 | RSS
A new ongoing malware campaign has been observed distributing three different stealers, such as CryptBot, LummaC2, and Rhadamanthys hosted on Content Delivery Network (CDN) cache domains since at least February 2024. Cisco Talos has attributed the activity with...
by Beck Bailey | Apr 23, 2024 | RSS
Researchers have identified a dependency confusion vulnerability impacting an archived Apache project called Cordova App Harness. Dependency confusion attacks take place owing to the fact that package managers check the public repositories before private registries,...
by Beck Bailey | Apr 23, 2024 | RSS
Learn about the potential vulnerabilities of VPNs and the measures you can take to enhance your VPN security.
by Beck Bailey | Apr 23, 2024 | RSS
In the high-stakes world of cybersecurity, the battleground has shifted. Supply chain attacks have emerged as a potent threat, exploiting the intricate web of interconnected systems and third-party dependencies to breach even the most formidable defenses. But what if...
Recent Comments