PowerShell Nightmare

PowerShell Nightmare

PowerShell provides a command-line shell, a framework, and a scripting language focused on automation for processing PowerShell cmdlets running on all major platforms, including Windows, Linux, and macOS combining with structural programming…
MS EDGE XSS Vulnerability

MS EDGE XSS Vulnerability

Microsoft rolled out updates for the Edge browser with fixes for two security issues, one of which concerns a security bypass vulnerability that could be exploited to inject and execute…

CISCO ASA Vulnerability goes wild

Hackers are scanning for and actively exploiting a vulnerability in Cisco ASA devices after a PoC exploit was published tracked as CVE-2020-3580. Is a Cisco ASA vulnerability is cross-site scripting…
Netfilter Unsigned Driver

Netfilter Unsigned Driver

Microsoft confirmed that it gave its seal of approval to Netfilter, a malicious driver used to distribute rootkit malware, as part of its Windows Hardware Compatibility Program (WHCP). Since Windows…
Chachi Strikes with PYSA

Chachi Strikes with PYSA

PYSA ransomware gang has started using a Golang-based Trojan RAT called ChaChi as part of a new campaign against educational organizations which is named after two key components of the…
BazaCall  📞 Dials to Harm

BazaCall 📞 Dials to Harm

Microsoft is warning Office users of a new malware campaign, called BazaCall involving fake subscriptions, fraudulent call centers, and a malicious Excel spreadsheet identified had human operated attacks and Ransomware…
North Korea Exploits South Korea

North Korea Exploits South Korea

South Korea's state-run Korea Atomic Energy Research Institute (KAERI) disclosed that its internal network was infiltrated by suspected attackers operating out of its northern counterpart. The intrusion is said to…