Vulnerability

Antivirus Security and the Role of Artificial Intelligence (AI)

With groundbreaking innovations and intelligent machines revolutionizing industries, the advent of AI is sparking endless possibilities  If you’re…

The Threat Landscape: Emerging Viruses and Malware to Watch Out For in 2023

We’re Midway into 2023, and the threat landscape is evolving with new variants of viruses and malware that…

Is the shift to 5G threatening the world of IoT Security?

The future is completely open, and so is IoT. The IoT or Internet of Things has completely digitized…

IoT Security

Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

A Zero-day Remote Code Execution Vulnerability with high severity has been identified as CVE-2022-30190 “FOLLINA” in Microsoft Windows…

follina vulnerability

Critical Zero-Day “Log4Shell” Vulnerability “CVE-2021-44228” Exploited in the Wild

On December 9, 2021, Apache revealed a severe Remote code execution vulnerability CVE-2021-44228 named “Log4Shell” in Apache Java-based…

log4shell

Spring4Shell: Zero-Day vulnerability CVE-2022-22965 in Spring Framework

A Zero-day Remote Code Execution Vulnerability with critical severity has been identified as CVE-2022-22965 aka Spring4Shell or SpringShell…

Coronavirus-themed Campaign delivers Agent Tesla Malware

  Summary: While the whole world fights against the COVID-19 pandemic, cybercriminals are busy exploiting the situation and…

HorseDeal Riding on The Curveball!

It’s surprising to see how quickly attackers make use of new vulnerabilities in malware campaigns. Microsoft recently patched…

Have you updated your browser yet? Severe Chrome Zero-day vulnerability getting actively exploited

Attention! Are you using Chrome as your web browsing software on your Windows, Linux and Mac? High time you update your browser!!…

What is Emotet?

Emotet malware was first identified in 2014 as Banking trojan. Emotet has evolved from banking trojan to threat…