Latest Articles
Sitevision Auto-Generated Password Vulnerability Expose Signing Key to Hackers
A critical vulnerability in Sitevision CMS, identified as CVE-2022-35202, has been discovered, potentially exposing private signing keys used for SAML authentication.
The flaw, present...
Widespread CL0P Ransomware Attacks Disrupt Telecommunications and Healthcare
The CL0P ransomware group, a notorious cybercriminal organization active since 2019, has launched a new wave of attacks targeting key sectors such as telecommunications...
Adversary-in-the-Middle Cybercriminals Attack Financial Institutions Using Sophisticated Exploits
Cybercriminal groups have escalated their attacks on financial institutions, employing advanced adversary-in-the-middle (AiTM) techniques to compromise sensitive systems.
These sophisticated exploits leverage vulnerabilities in...
SPAWNCHIMERA Malware Exploits and Patches The Ivanti VPN Vulnerability Itself
In a concerning development, the SPAWNCHIMERA malware family has been confirmed to exploit a critical vulnerability in Ivanti Connect Secure VPN (CVE-2025-0282) while simultaneously...
Dell Recover Point for Virtual Machines Vulnerabilities Allows Privilege Escalation
Dell Technologies has issued a security advisory regarding multiple vulnerabilities in its RecoverPoint for Virtual Machines (RP4VM) software.
These vulnerabilities could potentially allow low-privileged...
Proof-of-Concept Exploit Published for Critical Ivanti EPM Flaws
A recent investigation by Horizon3.ai has unveiled four critical vulnerabilities in the Ivanti Endpoint Manager (EPM).
These vulnerabilities, identified as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159,...
Hackers Delivering Malware to Compromise Freelance Software Developers Systems
In a troubling trend observed by cybersecurity experts, hackers are increasingly targeting freelance software developers through deceptive recruitment tactics.
ESET researchers have identified a...
New Bookworm Malware Exploits DLL Sideloading to Attack Windows Systems
A recent analysis by Unit 42 has revealed that the Stately Taurus threat group has been leveraging a variant of the Bookworm malware to...
ShadowPad Malware Upgrade Enables Stealthy Ransomware Deployment
In a concerning development, cybersecurity researchers have identified an upgraded version of the ShadowPad malware being used in ransomware attacks across multiple industries and...
North Korean Job Scam Spreads Malware Through Fake Chrome Update
In a sophisticated cyber-espionage campaign, North Korean threat actors have been leveraging fake job interview processes to deploy malware disguised as legitimate applications.
According...