A new campaign has attracted the attention of security researchers where Fortigate devices with publicly exposed management interfaces are being targeted. The campaign is believed ...
By
The Aviatrix Controller cloud networking platform has attracted active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz released a ...
By
Google Project Zero researcher Natalie Silvanovich discovered a vulnerability in which, as per the available details, an attack requires no user interaction to trigger (i.e., ...
By
Behind the gleaming gates of Apple’s supposedly impenetrable stronghold, a sinister force is quietly infiltrating, threatening to unleash chaos on 100 million unsuspecting macOS users. ...
By
A stack-based buffer overflow affects the Ivanti Connect Secure product prior to version 22.7R2.5, the Ivanti Policy Secure solution prior to version 22.7R1.2, and Ivanti ...
By
The Industrial Router manufacturer firm Four-Faith, which is based out of China, has seen its products getting attacked with the aim of conducting a Distributed ...
By
Cybersecurity researchers have discovered a new and dangerous malware called NonEuclid. This sophisticated malware can secretly control infected Windows computers. Cyfirma, in its technical analysis, ...
By
The government of India has come up with a draft to tighten the data protection laws of the country. The draft outlining the new guidelines ...
By
Reserve Bank of India has unveiled a project to combat the rapidly increasing financial frauds across the country where citizens are losing their hard-earned money. ...
By
A report released by the security firm CloudSEK highlighted that India has been attracting massive cyberattacks and stands second while the US topped the list ...
By