A major leak has exposed the entire sub-naked cognitive war between countries.
Researchers from Taiwan have discovered a major leak of classified documents. Thanks to the incident, large-scale operations of the Chinese Communist Party to wage "cognitive warfare" against the island. Details...
Two vulnerabilities allow the extraction of encrypted passwords without authentication.
Hackers have begun to actively exploit two critical vulnerabilities in the popular WhatsUp Gold software developed by Progress Software. This solution is widely used to monitor network availability and...
Mysterious malicious packages disappeared as suddenly as they appeared...
On July 7 of this year, a user of the npm developer repository named "nagasiren978" published two malicious packages: "harthat-hash" and "harthat-api", which contain code that installs additional malware from the...
Rust-based software, fake signatures, and communication with OceanLotus. What else will surprise the group?
In the period from 2022 to 2023, the Timitator group of cyber criminals actively attacked Chinese energy, scientific and military institutions. The attacks were carried out using phishing...
The popular "requests" package has been maliciously modified.
Security researchers from Phylum discovered a malicious package in the popular PyPI repository that disguises itself as the popular "requests" library, but in reality poses a significant threat to the entire developer community.
The...
Hackers hack Cisco VPN, CheckPoint, Fortinet!
International cybersecurity was under threat after experts from Cisco Talos discovered a large-scale credential matching campaign targeting VPN and SSH services of devices from companies such as Cisco, CheckPoint, Fortinet, SonicWall and Ubiquiti...
How ChatGPT helped malware bypass security.
In March 2024, cybercriminals attacked dozens of organizations in Germany using a PowerShell script allegedly created with the help of AI. The campaign distributes the Rhadamanthys infostiler.
Proofpoint attributed the campaign to the TA547 (Scully...
Your employees use apps that you don't know about. Are you sure they are safe?
Information security company Wing Security analyzed the use of SaaS applications in 493 companies and identified the main threats and ways to prevent them, offering recommendations for the safe use of SaaS.
The 2023...
Fortinet network devices helped deploy the COATHANGER backdoor for espionage.
Chinese government hackers broke into the computer network of the Dutch armed forces, using a vulnerability in Fortinet FortiGate devices.
According to a statement from the Dutch Military Intelligence and Security...
Many regions around the world have already been affected, and their number is only growing over time.
Recently, attacks on poorly protected MS-SQL servers have been observed in the United States, the European Union, and the Latin American region. Security researchers from Securonix believe that...