ESET APT Activity Report Q2–Q3 2023 summarizes the activities of selected advanced persistent threat (APT) groups that were observed, investigated, and analyzed by ESET...
Two North Korean state-backed threat groups, whom Microsoft is tracking as Diamond Sleet and Onyx Sleet, are actively exploiting CVE-2023-42793, a critical remote code...
HONG KONG, Oct 13, 2023 - (ACN Newswire) - The Hong Kong Electronics Fair (Autumn Edition), organised by the Hong Kong Trade Development Council (HKTDC)...
Proof-of-concept (PoC) exploits for the security flaw CVE-2023-4911, dubbed Looney Tunables, have already been developed, following last week's disclosure of the critical buffer overflow...
In the fast-paced landscape of cloud security, attacks have become a formidable adversary. As organizations migrate their data and applications to the cloud, malicious...
Basic security hygiene is more impactful than you may realize. While industry headlines are often dominated by emerging tech and the latest software or...
In this current economic slowdown, workers are accepting low-quality jobs with unspecified duty hours and at low pay rates. While challenging economic conditions...
A sprawling phishing empire from a threat actor known as W3LL is spreading globally, successfully compromising more than 8,000 corporate Microsoft 365 business accounts...
A sprawling phishing empire from a threat actor known as W3LL is spreading globally, successfully compromising more than 8,000 corporate Microsoft 365 business accounts...
A security researcher has published exploit code for AtlasVPN for Linux, which could enable anybody to disconnect a user and reveal their IP address...