—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 Command Injection Vulnerability in Zoom Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: HIGH Software Affected Zoom Node [...]
—–BEGIN PGP SIGNED MESSAGE—– Hash: SHA256 Multiple Vulnerabilities in Zimbra Daffodil Indian – Computer Emergency Response Team (https://www.cert-in.org.in) Severity Rating: HIGH Software Affected Zimbra Daffodil [...]
A Dangerous Spear in the Digital Landscape: APT28 Targets Microsoft Office 0-Day Vulnerability The digital defense perimeter is constantly under siege, and the latest alarm [...]
Apache Syncope Vulnerability Exposes User Sessions to Hijacking Risk A critical XML External Entity (XXE) vulnerability has been identified in Apache Syncope, a widely [...]
OpenClaw AI Agent Skills: A New Vector for Malware Delivery The burgeoning ecosystem of AI agents, designed to automate complex tasks and execute real system [...]
Hikvision Wireless Access Points: A Critical Vulnerability Exposes Networks to Command Execution The reliance on wireless infrastructure for seamless connectivity has made Wireless Access Points [...]
In a stark reminder of the persistent threats lurking within seemingly legitimate avenues, a dangerous banking malware known as Anatsa has once again breached the [...]
Defending Linux environments has always presented unique challenges, but the game has just shifted profoundly. A sophisticated, newly uncovered threat known as ShadowHS is [...]
The Disquieting Rise of Autonomous AI Agents in Cybercrime The cybersecurity landscape has reached a critical inflection point. What were once considered sophisticated automation [...]
Pulsar RAT Attacking Windows Systems via Per-user Run Registry Key and Exfiltrates Sensitive Details
The digital landscape is a constant battleground, and a new threat has emerged, specifically targeting Windows systems: the Pulsar Remote Access Trojan (RAT). This sophisticated [...]
