The Cactus ransomware gang has been exploiting vulnerable Qlik sense servers ever since November 2023 using multiple vulnerabilities such as…
Autodesk Drive is a data-sharing platform for organizations to share documents and files in the cloud. It also supports 2D…
The Iranian state-sponsored threat actor MuddyWater has been observed exploiting a legitimate remote monitoring and management (RMM) tool, Atera Agent,…
Hackers often target WordPress plugins as they have security loopholes that they can exploit to hack into sites without permission. …
In a significant move for tech enthusiasts and historians alike, Microsoft has made the source code for MS-DOS 4.0 publicly…
Progress addressed a critical vulnerability last week, which was associated with an unauthenticated Command injection on the Progress Flowmon product.…
Google announced the release of Chrome 124, which fixes four vulnerabilities, including a critical security issue that allows attackers to execute…
Malicious actors are distributing a new backdoor, MadMxShell, through a Google Ads campaign that impersonates an IP scanner. This Windows…
A new menace has emerged, affecting millions of devices worldwide. The PlugX USB worm, a sophisticated malware, has been reported…
Rodriguez and Hill, founders of the cryptocurrency mixing service Samourai, have been arrested for operating an unlicensed money-transmitting business and…