Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Blog
With exploit
With patch
6 May 2024
Threat actors increasingly abusing Microsoft Graph
Graph API is often used for discreet communications to cloud-based C&C servers.
Latest Posts
Marriott admits its systems were not encrypted before 2018 data breach
Marriott has acknowledged that it used SHA-1 algorithm, which does not qualify as encryption.
6 May 2024
Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany
The attacks targeted entities "related to Russia's war of aggression against Ukraine."
6 May 2024
Russian operator behind BTC-e crypto exchange pleads guilty to money laundering
Vinnik was one of the key operators of BTC-e, a primary facilitator for cybercriminals.
6 May 2024
Cyber Security Week in Review: May 3, 2024
In brief: the Dropbox breach, Chinese hackers caught manipulating China’s Great Firewall, REvil hacker sentenced, and moreю
3 May 2024
1
2
3
...
555
556
Popular Posts
Threat actors increasingly abusing Microsoft Graph
Marriott admits its systems were not encrypted before 2018 data breach
Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany
Featured vulnerabilities
Multiple vulnerabilities in F5OS
Low
Patched
|
06 May, 2024
Marvin side channel attack in rust-openssl package
Medium
Patched
|
06 May, 2024
Multiple vulnerabilities in IBM QRadar Suite software
Medium
Patched
|
06 May, 2024
HTTP request smuggling in Gunicorn
Medium
Patched
|
06 May, 2024
Prototype pollution in Conform
High
Patched
|
06 May, 2024