ClickCease Cybersecurity News Archives - Page 12 of 52 - TuxCare

APT28 HeadLace Malware Targeting European...

In recent months, a series of cyber onslaughts have shaken networks across Europe, with the insidious HeadLace malware at the heart of the storm. This malevolent software, attributed to the...

Microsoft OT Security Vulnerabilities: Protect...

In recent times, Microsoft security advisory has issued a stern warning about the pressing need to fortify the security of internet-exposed operational technology (OT) vulnerabilities on devices. This caution comes...

GitHub Server Flaw Causes Critical...

Recent developments have highlighted a critical security flaw in GitHub Enterprise Server, underscoring the importance of proactive measures to ensure the integrity of code hosting platforms. Let’s have a look...

GHOSTENGINE Exploit: Vulnerable Drivers Facing...

A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE, a cryptojacking campaign employing a sophisticated method to bypass security measures. In this blog, we’ll look at...

MS Exchange Server Flaw: Keylogger...

In a recent revelation, an unidentified malicious actor has been exploiting vulnerabilities in Microsoft Exchange Server to infiltrate systems with a keylogger malware, targeting various entities across Africa and the...

QNAP Patches: Medium Severity Flaws...

In recent updates, QNAP, a prominent Taiwanese company specializing in network-attached storage (NAS) solutions, has diligently addressed several vulnerabilities within its QTS and QuTS hero operating systems. These QNAP patches...

Unfading Sea Haze Attacks: Research...

In the ever-evolving landscape of cybersecurity, a new player has emerged onto the scene, named Unfading Sea Haze attacks. This previously undisclosed threat group has garnered attention from researchers due...

Alert: Kimsuky Hacking Group Targets...

As per recent reports a new social engineering attack attributed to the North Korea-linked Kimsuky hacking group is targeting human rights activists using fake Facebook accounts. This tactic, involving fictitious...

Deuterbear RAT: China-Linked Hackers’ Cyber...

Media reports claim that cybersecurity experts have recently unveiled new details about a remote access trojan (RAT) named Deuterbear, employed by the China-linked hacking group BlackTech. This sophisticated Deuterbear RAT...

CISA D-Link Router Vulnerabilities Being...

On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security vulnerabilities affecting D-Link routers to its CISA Known Exploited Vulnerabilities (KEV) catalog due to confirmed active exploitation....

Black Basta Ransomware Attack: Microsoft...

Recent reports claim that the Microsoft Threat Intelligence team stated that a cybercriminal group, identified as Storm-1811, has been exploiting Microsoft’s Quick Assist tool in a series of social engineering...

Mail

Join

4,500

Linux & Open Source
Professionals!

Subscribe to
our newsletter