technology

Information security specialists report the detection of a severe vulnerability in the TP-Link TL-WR840N EU routers. According to the report, successful exploitation of this flaw would allow threat actors toRead More →

A couple of months ago, CloudSEK researchers identified a new and unusual strain of ransomware. Dubbed GoodWill, this new variant of encryption malware appears to pursue very different targets thanRead More →

Cisco announced the fixing of a zero-day vulnerability in the software of its XR IOS routers whose exploitation would have allowed unauthenticated threat actors to remotely access Redis instances runningRead More →

In a recent alert, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) recommends VMware users update or even delete their deployments due to the detection of critical vulnerabilities, exploited justRead More →

The government of Switzerland has transferred to the United States a total of $15,111, 1453.84, representing the illicit proceeds obtained by an Internet advertising fraud scheme orchestrated by Kazakh citizensRead More →

In its most recent release, the operators of the Sysrv botnet included new exploits to use new vulnerabilities, posing a serious threat to Windows and Linux systems. Identified as Sysrv-K,Read More →

Rapid7 cybersecurity specialists report that thousands of Zyxel firewalls could be exposed to remote attacks due to a recently detected vulnerability. While the company has already released the corresponding patches,Read More →

Cybersecurity specialists reported the detection of a new post-exploitation framework that would allow the compromise of Microsoft Exchange servers. Identified as IceApple, this framework was developed by threat actors capableRead More →