General Security News
-
Cacti Blind SQL Injection Flaw Enables Remote Code Execution
Cacti, the performance and fault management framework, has been discovered with a blind SQL injection vulnerability, which could reveal Cacti...
-
Multiple QNAP High-Severity Flaws Let Attackers Execute Remote Code
QNAP has released multiple security advisories for addressing several high, medium, and low-severity vulnerabilities in multiple products,...
-
Microsoft's January 2024 Windows Update Patches 48 New Vulnerabilities
Microsoft has addressed a total of 48 security flaws spanning its software as part of its Patch Tuesday updates for January 2024. Of the 48 bugs,...
-
CISA Flags 6 Vulnerabilities - Apple, Apache, Adobe , D-Link, Joomla Under Attack
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added six security flaws to its Known Exploited Vulnerabilities (KEV) catalog,...
-
Alert: Water Curupira Hackers Actively Distributing PikaBot Loader Malware
A threat actor called Water Curupira has been observed actively distributing the PikaBot loader malware as part of spam campaigns in 2023....
-
Accenture Buys 6point6 to Expand Cyber Portfolio
Accenture, a global professional services company, has made a strategic move in the U.K. market by acquiring 6point6, a leading technology...
-
Incorporating Mobile Threat Defense into Your Device Management Ecosystem
In recent years, we have seen a significant shift in the global workforce. With the proliferation of high-speed internet and advanced...
-
Surge in Open Source Malware Stealing Login Credentials & Sensitive Data
Over the decade, Python has been dominating the programming languages and consistently growing with open-source love. Numerous popular...
-
Syrian Hackers Distributing Stealthy C#-Based Silver RAT to Cybercriminals
Threat actors operating under the name Anonymous Arabic have released a remote access trojan (RAT) called Silver RAT that’s equipped to bypass...
-
Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy
Cybersecurity is an infinite journey in a digital landscape that never ceases to change. According to Ponemon Institute1, “only 59% of...
-
Webinar – Leverage Zero Trust Security to Minimize Your Attack Surface
Digital expansion inevitably increases the external attack surface, making you susceptible to cyberthreats. Threat actors increasingly exploit the...
-
UAC-0050 Group Using Remcos RAT to Attack Government Agencies
Remcos RAT (Remote Control and Surveillance) is a type of Remote Access Trojan used for unauthorized access and control of a computer system....