Cyberespionage group Molerats has been observed abusing legitimate cloud services, like Google Drive and Dropbox as attack infrastructure. […]
The Dutch National Cybersecurity Centre (NCSC) warns organizations of risks associated with cyberattacks exploiting the Log4J vulnerability. The […]
Two critical security vulnerabilities in Control Web Panel potentially expose Linux servers to remote code execution attacks Researchers from Octagon […]
McAfee addressed a security flaw in its McAfee Agent software for Windows that allows running arbitrary code with SYSTEM […]
The U.S. Treasury Department announced sanctions against four current and former Ukrainian government officials for collaborating with Russia. […]