Cybersecurity

Critical Exposure: Over 10,000 Fortinet Firewalls Remain Vulnerable to Five-Year-Old 2FA Bypass

Over 10,000 Internet-exposed Fortinet firewalls are currently susceptible to active exploitation of a five-year-old two-factor authentication (2FA) bypass vulnerability, posing…

6 days ago

Cybercriminals Weaponize Google Cloud’s Application Integration in Multi-Stage Phishing

Cybercriminals are actively exploiting Google Cloud’s Application Integration service to launch multi-stage phishing campaigns, impersonating legitimate Google-generated messages to deceive…

6 days ago

Cyber Deception: ShinyHunters Claims Resecurity Breach, Firm Cries Honeypot

The notorious ShinyHunters hacking collective recently alleged a successful breach of cybersecurity firm Resecurity's internal systems, claiming to have exfiltrated…

6 days ago

Delayed Impact: LastPass Breach Fuels Ongoing Cryptocurrency Thefts

Blockchain investigation firm TRM Labs has definitively linked a series of ongoing cryptocurrency theft attacks to the 2022 LastPass data…

7 days ago

React2Shell Vulnerabilities: Critical Infrastructure Under Immediate Threat from Rapid Exploitation

Threat actors are swiftly leveraging newly disclosed React2Shell (RSC) vulnerabilities, integrating them into scanning and reconnaissance routines to target critical…

7 days ago

Transparent Tribe Unleashes New RAT Campaign Against Indian Strategic Sectors

Transparent Tribe, a persistent and sophisticated threat actor, has launched a renewed wave of remote access trojan (RAT) attacks targeting…

7 days ago

This website uses cookies.