Hackers Utilize Word Files to Distribute DanaBot Malware
Recent email campaigns distribute DanaBot malware through two document types: those exploiting equation editor and [...]
Recent email campaigns distribute DanaBot malware through two document types: those exploiting equation editor and [...]
iTunes has an arbitrary code execution vulnerability, potentially enabling attackers to execute malicious code. Apple [...]
The MITRE Corporation, a non-profit organization managing research and development centers for the U.S. government, [...]
CrushFTP disclosed a zero-day vulnerability (CVE-2024-4040) affecting versions below 10.7.1 and 11.1.0, allowing remote attackers [...]
Microsoft’s Active Directory (AD) acts as the backbone of your organization's network, regulating access to [...]