Oct 122 min readFeaturedIMMINENT WARNING: ACTIVE RANSOMWARE EXPLOITATION OF VEEAM VULNERABILITY; URGENT ACTION REQUIRED TO PREVENT SYSTEM COMPROMISE
Jun 153 min readFeaturedHACKER GROUP EXPLOITS VULNERABILITIES IN THE DOCKER IMAGE FOR CRYPTOJACKING CAMPAIGNS, AND THE RESEARCHERS TESTED THE SECURITY OF MICROSOFT'S VISUAL STUDIO CODE MARKETPLACE BY TYPOSQUATTING EXTENSION