
Blog Series
Cybersecurity News
- No categories

APT28 HeadLace Malware Targeting European...
In recent months, a series of cyber onslaughts have shaken networks across Europe, with the insidious HeadLace malware at the heart of the storm. This malevolent software, attributed to the...
Microsoft OT Security Vulnerabilities: Protect...
In recent times, Microsoft security advisory has issued a stern warning about the pressing need to fortify the security of internet-exposed operational technology (OT) vulnerabilities on devices. This caution comes...
GitHub Server Flaw Causes Critical...
Recent developments have highlighted a critical security flaw in GitHub Enterprise Server, underscoring the importance of proactive measures to ensure the integrity of code hosting platforms. Let’s have a look...
GHOSTENGINE Exploit: Vulnerable Drivers Facing...
A recent revelation in the cybersecurity realm uncovers a concerning development dubbed GHOSTENGINE, a cryptojacking campaign employing a sophisticated method to bypass security measures. In this blog, we’ll look at...
MS Exchange Server Flaw: Keylogger...
In a recent revelation, an unidentified malicious actor has been exploiting vulnerabilities in Microsoft Exchange Server to infiltrate systems with a keylogger malware, targeting various entities across Africa and the...
QNAP Patches: Medium Severity Flaws...
In recent updates, QNAP, a prominent Taiwanese company specializing in network-attached storage (NAS) solutions, has diligently addressed several vulnerabilities within its QTS and QuTS hero operating systems. These QNAP patches...
Unfading Sea Haze Attacks: Research...
In the ever-evolving landscape of cybersecurity, a new player has emerged onto the scene, named Unfading Sea Haze attacks. This previously undisclosed threat group has garnered attention from researchers due...
Alert: Kimsuky Hacking Group Targets...
As per recent reports a new social engineering attack attributed to the North Korea-linked Kimsuky hacking group is targeting human rights activists using fake Facebook accounts. This tactic, involving fictitious...
Deuterbear RAT: China-Linked Hackers’ Cyber...
Media reports claim that cybersecurity experts have recently unveiled new details about a remote access trojan (RAT) named Deuterbear, employed by the China-linked hacking group BlackTech. This sophisticated Deuterbear RAT...
CISA D-Link Router Vulnerabilities Being...
On Thursday, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two security vulnerabilities affecting D-Link routers to its CISA Known Exploited Vulnerabilities (KEV) catalog due to confirmed active exploitation....
Black Basta Ransomware Attack: Microsoft...
Recent reports claim that the Microsoft Threat Intelligence team stated that a cybercriminal group, identified as Storm-1811, has been exploiting Microsoft’s Quick Assist tool in a series of social engineering...