Reverse RAT 2.0

Reverse RAT 2.0

ReverseRAT, a remote access trojan used in major attack projects targeting organization in South and Central Asia, Called by Black Lotus researchers as ReverseRAT 2.0, the new variant is being…
GIT Operations Need 2FA

GIT Operations Need 2FA

GitHub is urging its base of users to enable two-factor authentication as the platform shakes up how it protects accounts from compromise.GitHub stopped accepting account passwords when authenticating Git operations.…
HolesWarm Botnet in Action

HolesWarm Botnet in Action

A new botnet named HolesWarm has been slowly growing in the shadow exploiting more than 20 known vulnerabilities to break into Windows and Linux servers and then deploy cryptocurrency-mining malware.…
Blackberry BadAlloc Alert !

Blackberry BadAlloc Alert !

BlackBerry released an advisory explaining that its QNX Real Time Operating System which is used in medical devices, cars, factories and even the International Space Station can be affected by…
Fortinet Command Injection Vulnerability

Fortinet Command Injection Vulnerability

An authenticated attacker could execute arbitrary commands as the root user on the underlying system via the SAML server configuration page. The vulnerability impacts Fortinet FortiWeb versions 6.3.11 and earlier, an authenticated…
Message Mirroring Threat

Message Mirroring Threat

Recent study highlighted more than 80% of all hacking-related breaches happen due to compromised and weak credentials, with three billion username/password combinations stolen.The implementation of two-factor authentication (2FA) has become…