Cyber Security

Cyber Security

Researchers have shared information about the watering hole attacks and the final malicious payload: a macOS backdoor with many capabilities.

Threat Intelligence

Threat Intelligence

This Metasploit module exploits an unauthenticated SQL injection vulnerability and a command injection vulnerability affecting the Grandstream UCM62xx IP PBX series of devices. The vulnerabilities allow an unauthenticated remote attacker to execute commands as root.

Technology

Technology

Part of its TruScale portfolio, the new service will bring cloud-like management of HPC resources to local data centers, allowing smaller businesses to access HPC services more rapidly.

Recently Added | Hourly updates!