In a recent shift of tactics, the notorious cybercrime group XE Group has transitioned from credit card skimming to exploiting zero-day vulnerabilities in their...
Hackers have successfully exploited a critical vulnerability in Cityworks deployments, a software used for GIS-centric asset and work order management, resulting in a high-severity remote code execution (RCE) attack. This security flaw, known as CVE-2025-0994 with a CVSS rating of 8.6/10, allows threat actors...
In a recent shift of tactics, the notorious cybercrime group XE Group has transitioned from credit card skimming to exploiting zero-day vulnerabilities in their...
Cybercriminals have been quick to adapt their strategies in exploiting large language models (LLMs), with a recent uptick in LLMjacking incidents causing concern. The discovery of LLMjacking by Sysdig TRT back in May 2024 marked the beginning of a trend where attackers have continuously...
The Network and Information Systems Directive 2 (NIS2) has been officially implemented by the European Union, with governments across the continent working on transposing...
In a recent blog post, cybersecurity expert Narendran Vaideeswaran from Crowdstrike explained the differences between NTLM and Kerberos in the authentication process. NTLM relies on a three-way handshake between the client and server to authenticate a user, while Kerberos uses a two-part process based...
In the lead-up to the big game, cybercriminals are gearing up to take advantage of the excitement surrounding the event. With various scams targeting...
In Karnataka, cybercrime has become a growing concern with over 1 lakh complaints received by the police, but only around 20,000 FIRs (First Information Reports) being filed. This alarming statistic showcases the challenges law enforcement agencies face in tackling cyber threats effectively.
With the rapid...