A massive botnet of over 130,000 compromised devices is conducting a large-scale password-spraying attack...
Learn
Stay up to date with the latest threats, vulnerabilities, news, guidance and tips, and job opportunities at CybaVerse.
Not too long ago, JSON Web Tokens (JWTs) were seen as the go-to solution for authentication. But fast forward...
The Lazarus Group, a North Korean-linked cybercriminal organisation, has once again upped its game—this time,...
Among the most active threats today is Lumma Stealer, a Malware-as-a-Service (MaaS) strain that allows...
UNC3569, a China-linked threat actor, has targeted the technology, gaming, energy, and telecommunications...
From August to November 2024, various malicious activities were recorded, including multiple incidents...
LNK files, or Windows shortcut files, are small metadata files used to create a pointer to other files,...
A newly disclosed (PoC) exploit has brought attention to a critical vulnerability in Windows (LDAP),...