The Cybersecurity and Infrastructure Security Agency (CISA) recently added two critical vulnerabilities to its Known Exploited Vulnerabilities (KEV)...
Vous n'êtes pas connecté
Ghost Ransomware, also known by various aliases such as Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture, is a sophisticated ransomware threat that has targeted organizations globally. This detailed analysis covers its emergence, tactics, attack methodology, and mitigation measures. Emergence and Targets Origin and Target Sectors Initial Access and Exploitation Exploited Vulnerabilities Ghost ransomware […]
The Cybersecurity and Infrastructure Security Agency (CISA) recently added two critical vulnerabilities to its Known Exploited Vulnerabilities (KEV)...
BlackLock ransomware, also known as El Dorado or Eldorado, has emerged as a significant cyber threat since its debut in March 2024. This...
XCSSET is a sophisticated malware targeting macOS users, especially software developers. Discovered by Trend Micro in 2020, XCSSET has evolved...
CISA and the FBI said attackers deploying Ghost ransomware have breached victims from multiple industry sectors across over 70 countries, including...
The EarthKapre campaign, also known as RedCurl or Red Wolf, represents a highly sophisticated and persistent cyberespionage operation targeting...
In February 2025, Atlassian released a comprehensive security advisory addressing 12 critical and high-severity vulnerabilities across its suite of...
Microsoft’s February 2025 Patch Tuesday is a significant update, addressing a total of 55 vulnerabilities, including four zero-day...
Microsoft released a security update as part of the February Patch Tuesday that addressed 61 vulnerabilities, including 25 classified as critical...
Microsoft has released security updates to address two Critical-rated flaws impacting Bing and Power Pages, including one that has come under active...
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Apple iOS and iPadOS and Mitel SIP Phones vulnerabilities to its Known Exploited...