Cyber Security
Uncovered by cybersecurity experts, a sophisticated cyberattack chain known as “KongTuke” is targeting unsuspecting internet users through compromised legitimate websites. Bradley Duncan from Palo Alto Networks’ Unit 42 team detailed in a report the use of...
Cyber Security
There is a new attack vector that cybersecurity experts have identified, in which threat actors are exploiting a vulnerability found in Google Chrome version 133.0.6943.126 using DLL side-loading methods. This attack, which is quite advanced, enables the execution of...
Cyber Security
An advanced cyberattack method known as Browser-in-the-Middle (BitM) has surfaced, empowering malicious actors to circumvent multi-factor authentication (MFA) and snatch user sessions in just a few seconds. This strategy leverages web browser features to seize...
Cyber Security
The surge of remote work has significantly expanded the attack surface for cyber attackers, underscoring the heightened importance of robust cybersecurity solutions. With organizations adapting to a scenario where employees are working from diverse locations, the...
Cyber Security
Cisco has released security notifications regarding various vulnerabilities impacting its IOS XR Software, focusing primarily on a notable memory corruption issue within the Border Gateway Protocol (BGP) confederation implementation. The identified vulnerability,...
Cyber Security
The CISA heightened its cybersecurity warning by including six critical Microsoft Windows vulnerabilities in its Known Exploited Vulnerabilities (KEV) Catalog, with four specifically impacting the New Technology File System (NTFS). These weaknesses identified as...