One of the interesting tricks used by LockBit affiliates is disguising their malware as copyright claims in order to trick users into infecting their...
On Linux-based Mitel MiVoice VOIP appliances, hackers have used zero-day exploits to hack into the systems. These attempts appear to be the beginning of...
It was reported by the Google Threat Analysis Group (TAG) that highly sophisticated spyware known as Hermit has been discovered. There are several ISPs...
QNAP released a security advisory detailing the critical PHP vulnerabilities that allow an attacker to Remote Code on QNAP NAS Devices.
According to the advisory,...
The experts at one of Europe’s leading universities, ETH Zurich, Switzerland reported a critical vulnerability in MEGA cloud storage that allows the attacker to...
The Chinese hacking group known as Tropic Trooper was attributed to a new campaign discovered by cybersecurity researchers at CheckPoint. In this case, a...
Perimeter 81 is excited to announce the early availability of our Secure Web Gateway (SWG) Solution. Organizations can now benefit from setting custom web...