CCAS
What is phishing?
During phishing, a target or targets are approached by email, telephone, or text message by
Zloader Banking a new Malware attack can be bypass Microsoft Signature Verification.
A ZLoader malware campaign is exploiting a nine-year-old flaw in Microsoft’s digital signature verification to
Remote hacking is possible for Garrett walk-through metal detectors.
A network component in Garrett Metal Detectors contains a number of security flaws that could
Code Signing Certificates are being used by new BLISTER malware to avoid detection.
According to researchers, evasive malware exploits valid code-signing certificates to evade security measures and deploy
Bug in macOS, Gatekeeper’s security can be bypassed by malware.
The macOS operating system was recently patched for a security vulnerability that could be exploited
Azure App Service Exposed Hundreds of Source Code Repositories after four years.
A security flaw has been discovered in Microsoft’s Azure App Service that exposed source code
ON Log4j Vulnerability CISA, FBI, and NSA publish a joint advisory.
The Australian, Canadian, New Zealand, U.S., and U.K. cyber security agencies released a joint advisory
Bugs in Active Directory could allow hackers to take over Windows domain controllers.
Following the availability of a proof-of-concept (POC) tool on December 12, Microsoft is urging customers
Chinese government suspends the Alibaba deal because it did not share the 0-day of Log4j with the government.
The Ministry of Industry and Information Technology (MIIT) of China temporarily suspended a partnership with