Pinned Post

Latest Posts

New SnailLoad Attack Exploits Network Latency to Spy on Users' Web Activities

A group of security researchers from the Graz University of Technology have developed a novel side-channel attack called as SnailLoad that might be …

8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining

Security experts have revealed further insight on the bitcoin mining operation done by the 8220 Gang by exploiting known security holes in the Oracl…

Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data

The North Korea-connected threat actor known as Kimsuky has been linked to the usage of a new malicious Google Chrome extension that's aimed to …

Google to Block Entrust Certificates in Chrome Starting November 2024

Google has declared its intention to prohibit websites using certificates from Entrust in its Chrome browser, commencing approximately on November 1…

Commando Cat Cryptojacking Attacks Target Misconfigured Docker Instances

The threat actor known as Commando Cat has been tied to an ongoing cryptojacking assault operation that utilizes inadequately protected Docker insta…

How to Build Your Autonomous SOC Strategy

Security officials are in a delicate position attempting to evaluate how much new AI-driven cybersecurity solutions might genuinely aid a security o…
Oops!
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.