The Way in Cyber Security Course and Certification

Command Your Cyber Destiny with Elite Cyber Security Training from Cryptus

In the fast-paced world of information technology, cyber security stands as a crucial bastion against the ever-growing tide of cyber threats. With data breaches, ransomware attacks, and phishing schemes making headlines regularly,... Read more »

Securing IoT Age of 5G: Navigating New Challenges and Threats

A new era of interconnection, especially with the Internet of Things (IoT), is heralded by the spread of 5G networks. Although this provides previously unheard-of connection, it also increases the exposure of... Read more »

Hacker’s links with Pakistan Use Golang, Python, and Rust Malware on Indian Targets

Cross-platform malware developed in Python, Golang, and Rust has been connected to a fresh round of attacks against the Indian government, defense, and aerospace industries by the Pakistan-based Transparent Tribe actor. In... Read more »

During a recent MITRE cyberattack, hackers used rogue virtual machines (VMs) to avoid detection.

According to information released by the MITRE Corporation, the threat actor in the cyberattack that targeted the non-profit organization in late December 2023 used rogue virtual machines (VMs) in its VMware environment... Read more »

Experts Discover a Defect in the Replicate AI Service That Exposes Customers’ Data and Models

Cybersecurity researchers have discovered a critical security vulnerability in Replicate, a company that offers artificial intelligence (AI) as a service. This vulnerability could have given threat actors access to private AI models... Read more »

The SolarMarker Malware Develops a Multi-Tiered Infrastructure to Resist Off Takedown Attempts

The persistent threat actors behind the SolarMarker information-stealing virus have created a multi-tiered infrastructure to confound law enforcement takedown operations, fresh findings from Recorded Future suggest. “The core of SolarMarker’s operations is... Read more »

Vulnerability of “Linguistic Lumberjack” Discovered in the Well-Known Logging Program Fluent Bi

Tenable Research has found a serious memory corruption flaw in Fluent Bit, a crucial part of the architecture used to monitor numerous cloud services, known as Linguistic Lumberjack. This vulnerability might be... Read more »

Microsoft Word Decoys Used to Spread Malware Based on Nim

Decoy Word (MS Word) documents are being used as bait by a new malware infection that provides a backdoor that’s written in the Nim programming language. Researchers at Netskope Ghanashyam Satpathy while... Read more »

Bug or Feature? Hidden Web Application Vulnerabilities Uncovered

Numerous security measures make up web application security, which makes sure that a web application: operates as anticipated. cannot be used to conduct out-of-bounds operations. cannot start processes that it isn’t meant... Read more »

Qualcomm Discloses Information About Chip Vulnerabilities Used in Sophisticated Attacks

More details regarding three high-severity security vulnerabilities that the chipmaker Qualcomm claimed fell under the category of “limited, targeted exploitation” in October 2023 have been made public. The vulnerabilities are as follows – CVE-2023-33063 (CVSS... Read more »