Home News Security & Vulnerability

Security & Vulnerability

Top 6 Ways to Use Cyber Threat Intelligence to Protect Your Organization

In the current technological environment, cyber threat intelligence (CTI) is crucial for defense. By assisting organizations in fending off new threats, this intelligence has already started to alter the way attackers...

Apple resolved a bug that could cause macOS Monterey to damage Macs equipped with...

Since the introduction of macOS Monterey, numerous Apple users have reported that applying the update bricked their devices. It was unclear what caused the problem until today, when Rene Ritchie got...

Because of a cyber attack, the Canadian government is doubtful how many of its...

Due to the recent cyber attack, the Canadian administration is unsure about the exact number of employees who are double-vaccinated in the country. However, as per Health Minister John Haggie, the...

This Is How Hackers Are Actively Exploiting a Critical Oracle Weblogic Vulnerability

Juniper Threat Labs researchers observed a  botnet known as DarkIRC is actively targeting thousands of exposed Oracle WebLogic servers in attacks designed to exploit the CVE-2020-14882 remote code execution (RCE) vulnerability...

Another cyber attack for Acer; Hackers hints of more malicious workers

Taiwanese global electronics giant Acer suffered a cyber attack on its Taiwan servers by the same hacking group responsible for hacking Acer’s Indian servers a few weeks ago. The authorities got to know about...

The scandal-plagued NSO supports worldwide spyware regulations

On Tuesday, the Israeli firm at the center of the Pegasus spying controversy stated that it would support international legislation to prevent authoritarian countries from exploiting strong spyware like its own. NSP...

These four scams will empty your bank account

In today's date, new types of internet scams are seen, which you and I are still unaware of. According to a report, 7 out of 10 people in India become victims...

Due to software flaws, Tesla has withdrawn its self-driving beta programme

After customers complained of erroneous collision warnings and other concerns, Tesla Inc (TSLA.O) turned back the newest version of its Full Self-Driving (FSD) beta software on Sunday, less than a day...

Vietnam Government Suffers Supply-Chain Attack: All you need to know

Only a few weeks after the supply chain assault on Able Desktop applications, another similar attack occurred on the website of the Vietnam Government Certification Authority (VGCA): ca.gov.vn.  The attackers changed two...

Babuk ransomware attack; Microsoft Exchange ProxyShell used

Reportedly, a new threat actor is working to hack Microsoft Exchange ProxyShell servers to breach and get access to the company's sensitive information by using ProxyShell vulnerability which is used...