Tag:Cyber Security

TrickBot Received a module for interaction with BIOS and UEFI

The developers of the TrickBot malware have added functions to it that allow it to control the boot process of the operating system and...

The risk is real: attacks on OT infrastructure

Previously, many believed that attacks on an isolated OT infrastructure (Operational Technology) were practically impossible, since everything works in a special network, separate from...

Threat Intelligence Automation

Cyber Threat Intelligence (CTI) is a framework and technology that generates intelligence that can, or will respond to cyber threat attacks that are now...

Artificial Intelligence and Cyber Security

As artificial intelligence intrudes into the world of cybersecurity, security analysts and experts are trying to make it easier to identify and counteract sophisticated...

Latest news

Fresh Apache Vulnerability May Lead to Remote Code Execution

Earlier this week, the Apache Software Foundation released a patch  to address the 0-day vulnerability CVE-2021-41773 in its HTTP web server. Already...
- Advertisement -

Chinese hack group GhostEmperor uses new rootkit against Windows 10

At the SAS 2021 conference, Kaspersky Lab analysts spoke about the tools of the new Chinese cyber-espionage group GhostEmperor, which has...

Fresh bug in VMware vCenter is already under attack

An exploit for the recently fixed RCE vulnerability in VMware vCenter (CVE-2021-22005) has been published online. Experts warned that hackers...

Must read

28 dangerous extensions detected for Google Chrome and Microsoft Edge

Avast experts have discovered malware hidden in at least 28 third-party...

Critical Infrastructure Warning! Millions of PLCs, switches, IoT devices are under threat

Eleven vulnerabilities, combined under the name Urgent / 11,...