19.9 C
Munich
Thursday, May 16, 2024
- Advertisement -

TAG

Hacking

Hackers Using Azure and AWS to Spread RATs

Researchers from Cisco Talos Intelligence found that hackers are using public cloud providers like Azure and AWS to spread RATs. These cloud services allow them...

13 Known Exploited Vulnerabilities Added to CISA Catalog

CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed...

You Need to Patch Windows Remote Desktop Vulnerability Now

CyberArk researched discovered a Windows Remote Desktop (RDP) vulnerability tracked as CVE-2022-21893, which you need to patch now! Vulnerability Description This vulnerability enables any standard unprivileged...

Huge Increase of WordPress Vulnerabilities in 2021

Riskbased Security researchers revealed a huge increase of WordPress vulnerabilities in 2021 in their latest research. 10,359 vulnerabilities were reported to affect third-party WordPress...

FBI Warning on Google Voice Authentication Scams

FBI has issued a warning regarding a new scam utilizing Google voice authentication. The scam targets people who share their numbers publicly. The scammers are...

Indian Hackers Scored an Embarrassing Own Goal

Indian hackers infected themselves with their own RAT. The APT group called "Patchwork" scored an embarrassing own goal during their recent campaign to drop...

Easy Way to Steal WiFi Passwords

Cracking of WiFi passwords when the proper protocol is in place and the password is not something ridiculous as "P@ssw0rd" is a very hard...

NIST Publications on Penetration Testing

Penetration testing is an important part of security for any organization that handles sensitive information. It helps ensure that systems are secure against attacks...

Information Security Best Practices for IoT

Like all other aspects of information security, securing IoT is a continuous journey. IoT devices are at risk of attack by a variety of...

35 Ways to Protect Yourself Online

The internet is a jungle of a million threats. Take action using 35 ways to protect yourself online. Passwords 1. Don't use easily guessable passwords...

Latest news

- Advertisement -