Blog Series
security vulnerabilites
Hackers target Microsoft SQL servers...
Microsoft SQL servers are being targeted with FARGO ransomware according to AhbLab Security Emergency Response Center (ASEC) researchers. MS-SQL servers are considered database management systems that store data for internet...
Webworm hackers use Windows-based RATs for...
A threat actor identified as Webworm is using Windows-based remote access trojans for cyber espionage. The Symantec Threat Hunter team identified cases where the attacker targeted an IT service provider...
Quantum, BlackCat ransomware gangs breach...
According to security researchers from AdvIntel, ransomware gangs such as Quantum and BlackCat are now using the Emotet malware in attacks. Emotet started as a banking Trojan in 2014 and...
Rockstar Games confirms GTA 6...
A hacker gained access to Rockstar Games’ internal servers and stole 3 GB worth of early GTA 6 footage, photo and source code for the game. The hacker, who was...
Microsoft’s Edge news feed exploited...
Security researchers at Malwarebytes have uncovered an ongoing malvertising campaign that injects ads into Microsoft’s Edge News Feed, redirecting potential victims to websites that promote tech support scams. The Threat...
Hackers exploit Oracle WebLogic Servers...
Cybersecurity company Trend Micro has uncovered a malware campaign in which threat actors exploit security vulnerabilities in the Oracle WebLogic Server to deliver cryptocurrency mining malware. One of the malware...
Hackers Actively Exploit WordPress Zero-day...
Wordfence, a WordPress security company, has warned of a zero-day WordPress vulnerability that is now being exploited by attackers. The bug is in a WordPress plugin called BackupBuddy. BackupBuddy is...
Common Python Applications That Are...
Python is a language that has experienced explosive growth since its release and is now used extensively across industries by developers with different experience levels. One of its interesting points...