In the last few years, ransomware has become the most prominent and concerning threat in today’s attack landscape. Through taking…
Blog
Patchstack, a leader in WordPress security and threat intelligence, has released a whitepaper to present the state of WordPress security…
HP has disclosed 16 high-impact UEFI firmware vulnerabilities that could allow threat actors to infect devices with malware that gain…
Today is Microsoft’s March 2022 Patch Tuesday, and with it comes fixes for three zero-day vulnerabilities and a total of…
A new Linux vulnerability known as ‘Dirty Pipe’ allows local users to gain root privileges through publicly available exploits. Today,…
The threat actor behind a nascent Android banking trojan named SharkBot has managed to evade Google Play Store security barriers by masquerading…
Watch out if you go on a page claiming to be from Facebook, as it is now the most ripped-off…
Ukraine was being hit by cyberattacks well before Russia launched its invasion. DDoS attacks and wiper malware were among the…
Passwords are a problem that big tech is trying to fix but they are still essential for accessing pretty much…
The Log4Shell vulnerabilities in the widely used Log4j software are still leveraged by threat actors today to deploy various malware…