Russian RomCom Exploits Zero-Day Flaws in Firefox and Windows
In a sophisticated wave of cyberattacks, a Russia linked threat group RomCom has exploited two zero-day vulnerabilities—one in Mozilla Firefox […]
In a sophisticated wave of cyberattacks, a Russia linked threat group RomCom has exploited two zero-day vulnerabilities—one in Mozilla Firefox […]
In a concerning development, cybercriminals are leveraging an old, vulnerable version of Avast’s Anti-Rootkit driver to disable security defenses and
New research highlights a major cybersecurity concern: over 145,000 Industrial Control Systems (ICS) are currently exposed to the internet across
Apple has rolled out critical security updates for its ecosystem, covering iOS, iPadOS, macOS, visionOS, and the Safari browser. These
Palo Alto Networks has confirmed active exploitation of a critical zero-day vulnerability in its PAN-OS firewall management interface. This flaw,
Microsoft has reportedly patched a zero-day vulnerability in Windows, which has been exploited in ongoing cyberattacks targeting Ukrainian organizations. The
Apple has introduced an “inactivity reboot” feature in the recent iOS 18.1 update. This functionality, while yet to be officially
VMware has announced that its popular VMware Fusion and VMware Workstation desktop hypervisors will now be available for free to
Cybersecurity and Infrastructure Security Agency (CISA) has reported that a critical vulnerability in Palo Alto Networks’ Expedition tool is being
Cisco has recently addressed a serious vulnerability that poses a significant risk to Ultra-Reliable Wireless Backhaul (URWB) access points, which
Google has announced that multi-factor authentication (MFA) will become mandatory for all Google Cloud accounts by the end of 2025.
Google has disclosed a critical security vulnerability in its Android operating system, designated as CVE-2024-43093. This flaw has been confirmed
A vulnerability in Microsoft SharePoint, tracked as CVE-2024-38094, has been actively exploited by attackers, leading to significant breaches of corporate
A researcher has unveiled a new tool capable of bypassing Google Chrome’s recently implemented App-Bound encryption system. This tool, named
Recently a significant vulnerability within Windows systems that allows attackers to install kernel rootkits on fully patched machines has been