Over 10,000 Internet-exposed Fortinet firewalls are currently susceptible to active exploitation of a five-year-old two-factor authentication (2FA) bypass vulnerability, posing…
Cybercriminals are actively exploiting Google Cloud’s Application Integration service to launch multi-stage phishing campaigns, impersonating legitimate Google-generated messages to deceive…
The notorious ShinyHunters hacking collective recently alleged a successful breach of cybersecurity firm Resecurity's internal systems, claiming to have exfiltrated…
Blockchain investigation firm TRM Labs has definitively linked a series of ongoing cryptocurrency theft attacks to the 2022 LastPass data…
Threat actors are swiftly leveraging newly disclosed React2Shell (RSC) vulnerabilities, integrating them into scanning and reconnaissance routines to target critical…
Transparent Tribe, a persistent and sophisticated threat actor, has launched a renewed wave of remote access trojan (RAT) attacks targeting…
This website uses cookies.