September 21st, 2023 | 🕒
iSpeech.org Sep 21, 2023THNVulnerability / Exploit A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR
September 13th, 2023 | 🕒
TTS Demo Sep 13, 2023THNVulnerability / Browser Security Mozilla on Tuesday released security updates to resolve a critical zero-day vulnerability
September 8th, 2023 | 🕒
iSpeech.org Sep 08, 2023THNZero Day / Cyber Attack Threat actors associated with North Korea are continuing to target the cybersecurity
September 8th, 2023 | 🕒
iSpeech.org Sep 08, 2023THNEndpoint Security / Exploit The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday warned that multiple
September 4th, 2023 | 🕒
https://www.ispeech.org/text.to.speech Sep 04, 2023THNVulnerability / Server Security An unknown threat actor has been observed weaponizing high-severity security flaws in the
September 3rd, 2023 | 🕒
iSpeech Sep 03, 2023THNNetwork Security / Vulnerability Proof-of-concept (PoC) exploit code has been made available for a recently disclosed and
August 30th, 2023 | 🕒
iSpeech Aug 30, 2023THNMalware / Endpoint Security New findings show that malicious actors could leverage a sneaky malware detection evasion
August 28th, 2023 | 🕒
Powered by iSpeech Aug 28, 2023THNVulnerability / Active Directory Cybersecurity researchers have discovered a case of privilege escalation associated with
August 9th, 2023 | 🕒
https://www.ispeech.org Aug 09, 2023THNCloud Security / Kubernetes Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency
August 2nd, 2023 | 🕒
Powered by iSpeech Aug 02, 2023THNVulnerability / A sophisticated Facebook phishing campaign has been observed exploiting a zero-day flaw in
July 17th, 2023 | 🕒
iSpeech Jul 17, 2023THNMobile Security / Malware Threat actors are taking advantage of Android's WebAPK technology to trick unsuspecting users
July 17th, 2023 | 🕒
TTS Demo Jul 17, 2023THNMalware / Cyber Threat Microsoft Word documents exploiting known remote code execution flaws are being used
July 11th, 2023 | 🕒
Convert Text to Speech A Microsoft Windows policy loophole has been observed being exploited primarily by native Chinese-speaking threat actors
June 21st, 2023 | 🕒
iSpeech Jun 21, 2023Ravie LakshmananCyber Threat / Privacy The North Korean threat actor known as ScarCruft has been observed using
June 14th, 2023 | 🕒
iSpeech.org Jun 14, 2023Ravie LakshmananZero-Day / Network Security The Chinese state-sponsored group known as UNC3886 has been found to exploit
May 22nd, 2023 | 🕒
TTSA financially motivated threat actor of Indonesian origin has been observed leveraging Amazon Web Services (AWS) Elastic Compute Cloud (EC2)
Gloss