New Very Powerful All in One Linux Malware
Previously undetected malware called Lightning Framework that targets Linux systems can be used as a backdoor using SSH and deploy rootkits to cover the tracks of attackers. Described as aRead More →
Previously undetected malware called Lightning Framework that targets Linux systems can be used as a backdoor using SSH and deploy rootkits to cover the tracks of attackers. Described as aRead More →
One of the attack methods that hackers can use is a simple Word document that they send in the mail. They use macros that are capable of executing the maliciousRead More →
SonicWall has published a hotpatch to fix two SQL injection vulnerabilities impacting the GMS (Global Management System) and Analytics On-Prem products. CVE-2022-22280 is a critical vulnerability (CVSS 9.4) that resultsRead More →
Searching vulnerabilities on the host (the host can be a website, web server, network device (router and others), end-user computer) begins with the collection of basic information. This information includesRead More →
Sensitive data is inherent to SAP solutions. Data must be protected against external unauthorized access, thus meaning extensive security and protection monitoring is required. Because SAP Systems have a holisticRead More →
Microsoft revealed on Tuesday that a large-scale phishing campaign targeted more than 10,000 organizations since September 2021 by attacking the Office 365 authentication process even on accounts secured with multi-factorRead More →
A few days ago Spain police sighted a new type of scam that has been called Reverse QR Scam. A fraudulent technique with which scammers steal money through this codeRead More →
We can say that the Tor browser is one of the most used when it comes to maintaining anonymity and privacy. It is in fact the one used to accessRead More →
In this tutorial, the specialists of the Cyber Security 360 course of the International Institute of Cyber Security (IICS) will show us how to use ZANTI, a pentesting tool thatRead More →
Lenovo released security fixes to address three vulnerabilities that reside in the UEFI firmware shipped with over 70 product models, including several ThinkBook models. ESET Research discovered and reported toRead More →