Portnox has expanded its zero trust platform to enable passwordless access for critical administrative tools like RDP and SSH, directly…
Read More »SSH
Entity category: technology
The ShadowSyndicate cybercrime infrastructure has expanded, with researchers linking dozens of servers through the repeated reuse of specific SSH fingerprints…
Read More »A new, reliable method in Raspberry Pi OS allows headless setup using a standard USB cable, bypassing tricky Wi-Fi and…
Read More »A China-linked cyber espionage group, UAT-7290, has expanded from South Asia to target telecommunications providers in Southeastern Europe, acting as…
Read More »The QingPing Air Quality Monitor 2 is an Android device with a touchscreen that provides real-time air quality data and…
Read More »Duplicati is a free, cross-platform backup tool that creates encrypted, incremental, and compressed backups from local data for storage on…
Read More »ProxyBridge is a free, open-source utility for Windows that routes specific application traffic through SOCKS5 or HTTP proxies, offering granular…
Read More »The Rhadamanthys infostealer malware service has been disrupted, with criminal subscribers losing access to their data-collection servers, possibly due to…
Read More »A state-sponsored threat actor breached SonicWall's cloud backup service using brute-force techniques, accessing all stored backup files through an API…
Read More »Modern ransomware groups exploit minor security oversights, such as human error and misconfigurations, to bypass multi-factor authentication and disable critical…
Read More »Three Chinese tech firms are identified as key enablers of the global Salt Typhoon hacking campaigns, supplying tools and services…
Read More »Cybercriminals are now patching the vulnerabilities they exploit to lock out rival hackers and maintain long-term, undetected access to compromised…
Read More »A ransomware campaign exploits Intel's ThrottleStop driver (rwdrv.sys) to disable Microsoft Defender via BYOVD attacks, deploying a malicious driver (hlpdrv.sys)…
Read More »A hacking group, Scattered Spider, is targeting VMware ESXi hypervisors via social engineering, compromising U.S. corporations by impersonating employees to…
Read More »Post-quantum cryptography is gaining urgency due to upcoming government mandates, and the open-source tool pqcscan helps organizations assess their systems'…
Read More »Thousands of Ruckus Networks devices are exposed to critical unpatched vulnerabilities, allowing attackers to take control of enterprise wireless environments.…
Read More »Secretless Broker is an open-source solution that enhances application security by removing password handling, acting as a secure intermediary between…
Read More »















