Strengthening the Front Line: Inside the Microsoft Defender for Office 365 ICES Vendor Ecosystem Email remains one of the most persistent attack surfaces for cybercriminals. As phishing, ransomware, and social …
cyber security updates
-
-
Critical D-Link Router Vulnerability Actively Exploited Table of Contents Critical D-Link Router Vulnerability Actively Exploited Understanding the Vulnerability Affected Devices Impact and Risks Mitigation and Recommendations A critical security vulnerability,tracked …
-
“`html Business Email Compromise (BEC): A extensive Guide Business Email Compromise (BEC): A Comprehensive Guide Table of Contents Business Email Compromise (BEC): A Comprehensive Guide What is Business Email Compromise …
-
MongoDB Vulnerability Allows Unauthenticated Heap Memory Read A high-severity security flaw has been disclosed in MongoDB that could allow unauthenticated users to read uninitialized heap memory. The vulnerability, tracked as …
-
## New MacSync Stealer Variant Bypasses macOS gatekeeper with Digitally Signed App Cybersecurity researchers have discovered a new variant of a macOS information stealer called MacSync that’s delivered by means …
-
## crypto Mining Campaign Targets AWS Customers via Compromised IAM Credentials Dec 16, 2025Ravie LakshmananMalware / Threat Detection An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers …
-
NANOREMOTE: New windows Backdoor Leverages Google Drive API for C2 Cybersecurity researchers have disclosed details of a new fully-featured Windows backdoor called NANOREMOTE that uses the Google Drive API for …
-
The U.S. Department of Justice (DoJ) on Friday announced that five individuals have pleaded guilty to assisting north Korea’s illicit revenue generation schemes by enabling details technology (IT) worker fraud …
-
# CISA Adds Five New Vulnerabilities to its Exploited list, Including oracle EBS Flaw Oct 20, 2025Ravie LakshmananThreat Intelligence / Data Security The U.S. Cybersecurity and Infrastructure Security Agency (CISA) …
-
Ukrainian Government Agencies Targeted in Phishing Campaign Delivering CountLoader, Amatera Stealer, adn pureminer Table of Contents Ukrainian Government Agencies Targeted in Phishing Campaign Delivering CountLoader, Amatera Stealer, adn pureminer Evolving …