Home Search
Weekly Round-Up - search results
If you're not happy with the results, please do another search
Researchers Unpacked ViperSoftX Malware’s Evasion Tactics And Techniques
Sophisticated threat actors, like those behind the ViperSoftX malware from 2020, often make use of existing tools to save time and resources.
ViperSoftX uses AutoIt,...
Chrome Zero-Day Vulnerability (CVE-2024-7965) Actively Exploited in the Wild
Google has addressed a critical zero-day vulnerability in its Chrome browser, identified as CVE-2024-7965. This high-severity flaw, which affects versions of Chrome prior to...
15 Best Patch Management Tools In 2024
Patch management tools or software are essential for maintaining software systems' security and functionality. They automate identifying, acquiring, testing, and deploying patches to ensure...
Chrome Zero-day Vulnerability (CVE-2024-7971) Actively Exploited in The Wild
Google has recently addressed a high-severity zero-day vulnerability in its Chrome browser, identified as CVE-2024-7971. This vulnerability involves a type of confusion issue within...
10 Best Automated Penetration Testing Tools In 2024
Automated penetration testing, known as vulnerability scanning, uses software to detect security flaws in networks, websites, applications, and cloud infrastructure.
The process of assessing security...
Indian Crypto Platform Wazirx Hacked: $230 Million Funds Stolen
Indian cryptocurrency exchange WazirX announced that it has fallen victim to a sophisticated cyber attack, resulting in the theft of over $230 million from...
30 Best Cyber Security Search Engines In 2024
In the 21st century, it has become crucial for every user, including IT security professionals, to access search engines, as they have become essential...
Hackers Weaponizing Microsoft Office Documents to Deploy Malware in Business Environments
Microsoft Office allows one to generate a professional business report on office365 or write college essays, prepare CVs, take notes, and perform analysis.
These offer...
Best Practices for Deploying and Managing Endpoint Management Software
Endpoint management software plays a crucial role in ensuring the security and efficiency of an organization's network. As technology advances and threats become more...
SandStorm Hackers Added New Kapeka Tool to it’s Arsenal
Kapeka, also known as KnuckleTouch, is a sophisticated backdoor malware that has been making waves in the cybersecurity world.
Initially appearing in mid-2022, it wasn’t...