5 Min Read LineasDNSon07/12/2023Microsoft Warns of COLDRIVER’s Evolving Evasion and Credential-Stealing Tactics The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that are of strategic interests to…
2 Min Read LineasDNSon07/12/2023New Bluetooth Flaw Let Hackers Take Over Android, Linux, macOS, and iOS Devices A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as…
5 Min Read LineasDNSon07/12/2023Exploiting Vulnerabilities in the ‘First Line of Cyber Defense’ Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the ever-evolving realm of…
4 Min Read LineasDNSon07/12/2023Building a Robust Threat Intelligence with Wazuh Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at…
3 Min Read LineasDNSon07/12/2023Governments May Spy on You by Requesting Push Notifications from Apple and Google Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue people of interest, according to…
2 Min Read LineasDNSon07/12/2023New Stealthy ‘Krasue’ Linux Trojan Targeting Telecom Firms in Thailand A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies in Thailand by threat actors to…
3 Min Read LineasDNSon07/12/2023Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger Meta has officially begun to roll out support for end-to-end encryption (E2EE) in Messenger for personal calls and one-to-one personal…
2 Min Read LineasDNSon06/12/2023Threat Actors Can Leverage AWS STS to Infiltrate Cloud Accounts Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way to infiltrate cloud accounts and conduct…
5 Min Read LineasDNSon06/12/2023Unveiling the Threat of Malicious Browser Extensions Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules that are added to the…
2 Min Read LineasDNSon06/12/2023Flaws in Sierra Wireless Routers Expose Critical Sectors to Cyber Attacks A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular routers and open-source software components like…