Pinned Post

Latest Posts

U.S. Proposes Ban on Connected Vehicles Using Chinese and Russian Tech

The U.S. Department of Commerce (DoC) stated it's seeking a ban on the import or sale of connected cars that combine software and hardware suppl…

CISA Flags Critical Ivanti vTM Vulnerability Amid Active Exploitation Concerns

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a serious security weakness harming Ivanti Virtual Traffic Manager…

Transportation Companies Hit by Cyberattacks Using Lumma Stealer and NetSupport Malware

Transportation and logistics organizations in North America are the focus of a new phishing effort that delivers a range of information stealers and…

Hacktivist Group Twelve Targets Russian Entities with Destructive Cyber Attacks

A hacktivist group known as Twelve has been detected employing an arsenal of publicly accessible tools to undertake devastating cyber operations aga…

Chinese Hackers Exploit GeoServer Flaw to Target APAC Nations with EAGLEDOOR Malware

A suspected advanced persistent threat (APT) originating from China targeted a government entity in Taiwan, and perhaps other nations in the Asia-Pa…

New PondRAT Malware Hidden in Python Packages Targets Software Developers

Threat actors with links to North Korea have been spotted utilizing poisoned Python packages as a mechanism to transmit a new virus named PondRAT as…

Discord Introduces DAVE Protocol for End-to-End Encryption in Audio and Video Calls

Popular social messaging network Discord has announced that it's putting out a new proprietary end-to-end encrypted (E2EE) protocol to protect a…

Critical Flaw in Microchip ASF Exposes IoT Devices to Remote Code Execution Risk

A significant security hole has been revealed in the Microchip Advanced Software Framework (ASF) that, if properly exploited, might lead to remote c…
Newest