New Wi-Fi Auth Bypass Flaw Exposes Home & Enterprise Attacks
Security researchers Mathy Vanhoef and Héloïse Gollier, have recently uncovered several critical vulnerabilities in the Wi-Fi authentication protocols used in...
Security researchers Mathy Vanhoef and Héloïse Gollier, have recently uncovered several critical vulnerabilities in the Wi-Fi authentication protocols used in...
The .NET malware obfuscators are tools used to obfuscate the source code of .NET applications, making it challenging for reverse...
Zoom, a well-known video conferencing software, has patched seven vulnerabilities in its desktop and mobile applications, particularly a critical flaw identified...
Wireshark, the most popular network protocol analyzer worldwide, has released version 4.2.3, which includes new features and upgrades. Wireshark, a...
VOLTZITE, a designated threat group, has been discovered by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), which overlaps with...
Threat actors hunt for ways to exploit vulnerabilities by employing tactics from technical zero-days to broad phishing. Social engineering blends...
Threat actors of Iranian origin, CharmingCypress (also known as Charming Kitten, APT42, TA453), have gathered political intelligence against international targets,...
Threat actors exploit Microsoft Defender SmartScreen zero-day flaws to circumvent the security mechanisms designed to protect users from malicious websites...
Glupteba, a decade-old malware in financial cybercrime, unveiled a new campaign in November 2023. Despite its long tenure, the undiscovered...
Secure Network as a Service (SNaaS) for Managed Service Providers (MSPs) delivers networking and security services to clients via the...
[mc4wp_form id=”387″]
[mc4wp_form id=”387″]
Copyright © 2022 Cyber Affairs. All rights reserved.