Open Nav
Sign Up

CYBER Threat Intelligence Reports

LATEST CTIs

SpectralBlur macOS Backdoor

Cybersecurity researchers have identified a new backdoor malware targeting Apple macOS systems, named SpectralBlur. This malware has been attributed to North Korean threat actors and…

Read more >

Urgent Alert spectralblur backdoor

New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections

A new variant of DLL Search Order Hijacking now Bypasses Windows 10 and 11 protections.

Read more >

Urgent Alert - New Variant of DLL Search Order Hijacking Bypasses Windows 10 and 11 Protections

Sophisticated ‘Operation Triangulation’ Exploits Undocumented iPhone Hardware Features

A highly sophisticated cyber-espionage campaign, dubbed ‘Operation Triangulation’, has been leveraging undocumented hardware features in Apple's iPhone chips to bypass stringent security measures. Kaspersky's Global…

Read more >

operation triangulation exploit

Privilege Escalation Flaw in Google Cloud’s Kubernetes Service Resolved

Google Cloud recently patched a medium-severity security vulnerability in its Kubernetes Service, which could allow attackers with existing access to a Kubernetes cluster to escalate…

Read more >

Google Cloud Kubernetes Patch Release

New Chrome Zero-Day Vulnerability (CVE-2023-7024)

A newly identified vulnerability in the Google Chrome browser has been discovered, referenced as CVE-2023-7024. This vulnerability has been actively exploited in the wild and…

Read more >

Chrome Zero-Day Vulnerability

Multiple Vulnerabilities in Perforce Server

Microsoft has identified four critical flaws in Perforce Helix Core Server, with the most severe allowing for remote code execution (RCE) and network takeover.

Read more >

Multiple Vulnerabilities in Perforce Server

Cybersecurity Best Practice

Under Cyber Attack?

Fill out the form and we will contact you immediately.