Cyber Security
Remcos is a Remote Entry Trojan (RET) that permits intruders to achieve unauthorized command over compromised computers. This RET has been militarized and frequently utilized in unlawful cyber activities since its inception in 2016. Recently, analysts at Trellix...
Cyber Security
Oracle WebLogic Server functions as an application server primarily tailored for the development, deployment, and management of enterprise applications following Java EE and Jakarta EE standards. It plays a pivotal role within Oracle’s Fusion Middleware, offering a...
Cyber Security
Motorcycle company Kawasaki Europe (KME) has officially declared that it fell victim to a cyber assault in early September, resulting in temporary disruptions to its operations. KME mentioned that despite the unsuccessful nature of the attack, it led to the isolation...
Cyber Security
Not only government organizations should be concerned about cyber espionage campaigns — the entire business sector is also a prime target. In recent years, geopolitics has witnessed a significant shift towards multipolarity. The ongoing rivalries among major global...
Cyber Security
A new security loophole named “GAZEploit” has been uncovered that enables cyber intruders to seize keystrokes from the virtual keyboards of Apple Vision Pro. This exploit takes advantage of the gaze-tracking technology utilized for typing based on eye movements on...