Month: November 2022

Publicly exposed Amazon cloud service...
Thousands of databases hosted on Amazon Web Services Relational Database...
Attackers leverage malicious python packages...
Security researchers from Checkmarx have uncovered an ongoing supply chain...
The Many Faces of...
Keeping your systems up to date can be done in...
Hackers exploit DLL hijacking flaw...
Attackers are using phishing tactics to spread QBot, a Windows...
Why Are Operational Technology Devices...
Gone are the days of Operational Technology (OT) being distinctly...
Apple patch iOS and macOS...
Apple has released security updates for iOS, iPadOS, and macOS...
What are the Risks of...
Cybersecurity professionals need to be aware of new threats and...
Worok, the malware that hides...
Worok malware makes the rounds by deploying multi-level malware designed...
What is Linux Kernel Live...
Breakthroughs don’t often happen in cybersecurity, but when one does,...
IceXLoader malware targets home and...
IceXLoader, an updated version of a malware loader, is suspected...
Patching Instead of Upgrading Legacy...
Operational technology (OT) is equipment and computer software used for...
Hackers exploit security flaw in...
A security researcher, David Schütz has received a $70,000 bug...