News

Threat actors are exploiting exposed Docker APIs to deploy malware and cryptocurrency miners and potentially create a new botnet.
Read about a Black Hat session describing how free trials of cloud services can be pooled to build a Bitcoin-mining botnet or a DDoS engine.
In fact, CISA recently added three TP-LINK flaws to KEV, CyberInsider reported, including CVE-2023-50224 (an authentication bypass by spoofing vulnerability), and CVE-2020-24363 (a factory reset and ...
Peter Yuryevich Levashov, a Russian national, was arrested in Barcelona and charged with running a massive international spambot.