Linux security

Top 5 Best SIEM Software for 2023

SIEM Software is a critical part of data security environment, they collect data from multiple endpoints, analyze the data to…

2 years ago

RapperBot malware targeting game servers via DDOS attacks

A malware linked to Mirai has re-emerged as 'RapperBot' in a new campaign that targets IoT devices for DDOS attacks…

2 years ago

Zoho ManageEngine vulnerability used in the RCE attacks

The CISA has alerted the IT community for  a critical Java deserialization vulnerability affecting several Zoho ManageEngine solutions. The security flaw…

2 years ago

CISA lists 7 critical vulnerabilities exploited by hackers in the wild

The CISA has mentioned seven new vulnerabilities to the list of bugs that are actively exploited by threat actors as…

2 years ago

New Mars Stealer malware is distributed via Google Ads and OpenOffice

A new information stealing payload called Mars Stealer malware is increasing in popularity and threat analysts have spotted large scale…

3 years ago

Create the best vulnerability management strategy for your network

The Vulnerability management strategy is composed of six stages, that comes with several challenges needing to be addressed individually. In…

3 years ago

Top 5 Hacking Tools for 2022- Best Hacking Software

Hacking tools are used by red teams, security professionals and hackers to test or breach a network or device. Here…

3 years ago

CISA lists a set of free cybersecurity tools and services

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States announced a repository of free cybersecurity tools and services…

3 years ago

EU DPA bans Pegasus Software and similar Spyware tools

The European Union Data Protection Authority (DPA) called for a ban on the development and use of Pegasus like commercial…

3 years ago

A Pop TV station from Slovenia was hit by a Cyber Attack

Slovenia's popular TV station 'POP TV' has fell victim to a cyber attack this week. The attack is believed to…

3 years ago