In yesterday post , we have seen the most headlined ransomware attacks and breaches of 2021 . Today in this post, most prevailed malwares are been captured in alphabetical order.…
A new ransomware group called Memento takes the unusual approach of locking files inside password-protected archives after their encryption method kept being detected by security software. The group became active…
Cybercriminals are started leasing our rather than just selling zero-day vulnerabilities under a potential ‘exploit-as-a-service’ model for the first time This approach would allow more capable threat actors to ‘rent out’ zero-day…
A software library named as Nucleus maintained by Siemens and used in three billion operational technology and IoT devices that could allow for remote code execution, DoS, and information leak…
Cisco Security analyzed Snort telemetry coming from Cisco Secure Firewalls to identify the most frequently encountered rules through the lens of the MITRE ATT&CK framework. The MITRE ATT&CK framework describes attacker behavior…
MITRE and CISA have announced the release of the 2021 CWE Most Important Hardware Weaknesses list. The list was published with the intent of raising awareness of common hardware weaknesses…
Security researchers are compiling an easy-to-follow list of vulnerabilities ransomware gangs and their affiliates are using as initial access to breach victims' networks. The list include security flaws found in…
Updates released for Drupal 8.9, 9.1 and 9.2 patch five vulnerabilities that can be exploited for CSRF and access bypass issues. Three of the flaws are related to access bypass.…