admin

hVNC Malware

hVNC Malware Used by Russian Cybercriminals

RUSSIAN CYBERCRIME GROUP TA505 HAS BEEN OBSERVED USING NEW HVNC (HIDDEN VIRTUAL NETWORK COMPUTING) MALWARE IN RECENT ATTACKS, THREAT INTELLIGENCE COMPANY ELASTIC REPORTS. Called Lobshot, the malware allows attackers to bypass fraud detection engines and provides them with stealthy, direct access to the infected machines. In order to evade detection, Lobshot uses dynamic import resolution to …

hVNC Malware Used by Russian Cybercriminals Read More »

zyxel firewall

Zyxel Firewall Vulnerable to Remote Code Execution Attacks — Patch Now!!

Networking equipment maker Zyxel has released patches for a critical security flaw in its firewall devices. This flaw could allow attackers to remotely execute code on affected systems A security flaw in Zyxel’s firewall devices, identified as CVE-2023-28771, has a high CVSS score of 9.8. Products impacted by the flaw are – Zyxel addressed high-severity post-authentication …

Zyxel Firewall Vulnerable to Remote Code Execution Attacks — Patch Now!! Read More »

EndPoint Security

Endpoint security refers to the practice of securing endpoints or devices such as laptops, desktops, mobile phones, and servers, that are connected to a corporate network. With the increasing number of cyberattacks and data breaches, endpoint security has become a critical aspect of cybersecurity. Endpoint security aims to protect the endpoints from malware, unauthorized access, …

EndPoint Security Read More »

Cloud computing

Secure ICT Solutions providing a Cloud computing resources, including servers, storage, databases, networking, software, analytics, and intelligence, over the Internet (i.e., the “cloud”) to offer faster innovation, flexible resources, and economies of scale. Rather than owning and maintaining physical servers and infrastructure, organizations can access and use a range of resources on-demand from cloud service …

Cloud computing Read More »