Home Search
malicious attacker - search results
If you're not happy with the results, please do another search
Cybersecurity in Healthcare Apps: Most Common Risks
Various software solutions are present in all industries, including the healthcare sector. For decades, medical institutions and practitioners have relied on different types of...
Why Permission Access is Essential for Robust Cyber Security
In the age of digital transformation, our lives are increasingly intertwined with the online world. Almost everything we do has something to do with...
PoC Exploit Released for Ivanti EPMM MobileIron Core
A newly disclosed vulnerability, CVE-2024-22026, has been found in Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core.
This vulnerability allows a local attacker to gain...
Hackers Exploiting Microsoft’s Quick Assist Tool To Deliver Ransomware
Hackers often target remote assist tools because they create a direct channel to access desired systems with minimum effort.
These tools have been built for...
Apple Safari Zero-Day Flaw Exploited At Pwn2Own : Patch Now
Apple has released security updates to address a zero-day vulnerability in its Safari web browser that was exploited during this year's Pwn2Own Vancouver hacking...
Critical SAP NetWeaver & CX Commerce Flaw Leads To Complete Takeover
Three vulnerabilities associated with CSS injection, file upload, and remote code execution have been discovered in the SAP Customer Experience (CX) commerce cloud and...
5 Common Phishing Vectors and Examples – 2024
Phishing attacks can be executed through various means, such as SMS and phone calls, but the most prevalent method involves sending victims emails containing...
Turla APT Group Attacking European Ministry of Foreign Affairs
The well-known advanced persistent threat (APT) group Turla, based in Russia, is said to be going after the European Ministry of Foreign Affairs.
This new...
Alert! Microsoft Fixes 60 Vulnerabilities With 2 Actively Exploited Zero-Days
In its May 2024 Patch Tuesday release, Microsoft addressed 60 vulnerabilities, including 2 zero-day vulnerabilities actively exploited in the wild.
The updates cover a range...
Hackers Weaponize Word Files To Deliver DanaBot Malware
Recent email campaigns distribute DanaBot malware through two document types: those using equation editor exploits and those containing external links, where attackers send emails...