SIEM as a Service
Home Search

malware - search results

If you're not happy with the results, please do another search
malicious Google Search Ads

Hackers Exploiting Google Search Ads to Launch Malvertising Campaigns

Threat researchers have identified a persistent series of malvertising campaigns targeting graphic design professionals, using Google Search ads as a vector. This campaign, active...
Critical Mullvad VPN Vulnerabilities Let Attackers Execute Malicious Code

Critical Mullvad VPN Vulnerabilities Let Attackers Execute Malicious Code

Security researchers have uncovered several high-severity vulnerabilities in the popular Mullvad VPN service that could allow attackers to execute malicious code and compromise user...
Weekly Cyber Security News Recap

Weekly Cyber Security News Recap: Data Leaks, Vulnerabilities & Cybersecurity News

Welcome to this week's Cyber Security Newsletter, where we delve into the latest developments and crucial updates in cybersecurity. Your involvement in this rapidly...
Curl Vulnerability Attackers Sensitive Information

Curl Vulnerability Let Attackers Access Sensitive Information

A critical security flaw has been discovered in the popular data transfer tool Curl, potentially allowing attackers to access sensitive information. The vulnerability, identified as...
Passkey

Microsoft Blocks 7000 Password Attacks/sec – 1 Billion Password to be Replaced With “Passkey”

In a significant turn towards a passwordless future, Microsoft has announced groundbreaking strides in adopting passkeys, a secure and user-friendly alternative to traditional passwords. With...
Firewall Management Tools

Top 15 Firewall Management Tools in 2025

Firewall management tools are essential for maintaining network security by monitoring and controlling incoming and outgoing traffic based on predetermined security rules. They help...
web scanners

10 Best Web Scanners for Website Security In 2025

When it comes to securing your website, using the best web scanners is crucial. These tools help identify vulnerabilities such as SQL injection, cross-site...
CISA Warns of Cleo 0-Day Vulnerability Exploited by Ransomware Gangs

CISA Warns of Cleo 0-Day Vulnerability Exploited by Ransomware Gangs

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical vulnerability in Cleo's file transfer software being actively exploited...
Yahoo Terminates Their Entire Red Team

Yahoo Terminates Their Entire Red Team From The “Team Paranoids”

Yahoo has laid off around 25% of its cybersecurity team, known as "The Paranoids," over the past year, according to information obtained by Cyber Security...
Hackers Scanning RDP Services Especially Port 1098 For Exploitation

Hackers Scanning RDP Services Especially Port 1098 For Exploitation

There is a significant surge in scanning activities targeting Remote Desktop Protocol (RDP) services, with a particular focus on port 1098/TCP. Over the past two...
SIEM as a Service

Recent Posts