March 11th, 2024 | 🕒
iSpeech.org Mar 11, 2024NewsroomNetwork Security / Vulnerability Technical specifics and a proof-of-concept (PoC) exploit have been made available for a
March 6th, 2024 | 🕒
iSpeech.org Mar 06, 2024NewsroomServer Security / Cryptocurrency Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker,
March 5th, 2024 | 🕒
iSpeech Mar 05, 2024NewsroomMalware / Cyber Threat North Korean threat actors have exploited the recently disclosed security flaws in ConnectWise
February 6th, 2024 | 🕒
https://www.ispeech.org Feb 06, 2024NewsroomDark Web / Cybercrime Employment agencies and retail companies chiefly located in the Asia-Pacific (APAC) region have
January 11th, 2024 | 🕒
https://www.ispeech.org Jan 11, 2024NewsroomVulnerability / Cyber Attack Cybersecurity researchers have developed a proof-of-concept (PoC) code that exploits a recently disclosed
January 11th, 2024 | 🕒
iSpeech Jan 11, 2024NewsroomCybersecurity / Zero-Day A pair of zero-day flaws identified in Ivanti Connect Secure (ICS) and Policy Secure
January 3rd, 2024 | 🕒
iSpeech.org Jan 03, 2024NewsroomMalware / Data Theft Information stealing malware are actively taking advantage of an undocumented Google OAuth endpoint
December 22nd, 2023 | 🕒
https://www.ispeech.org Dec 22, 2023NewsroomMalware / Cyber Attack The threat actor known as UAC-0099 has been linked to continued attacks aimed
November 21st, 2023 | 🕒
https://www.ispeech.org/text.to.speech Nov 21, 2023The Hacker NewsCybercrime / Malware Analysis Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in
November 21st, 2023 | 🕒
Free Text to Speech Nov 21, 2023NewsroomLinux / Rootkit The Kinsing threat actors are actively exploiting a critical security flaw
November 16th, 2023 | 🕒
https://www.ispeech.org Nov 16, 2023NewsroomCloud Security / Ransomware A set of novel attack methods has been demonstrated against Google Workspace and
November 15th, 2023 | 🕒
https://www.ispeech.org/text.to.speech Nov 15, 2023NewsroomRansomware / Vulnerability Cybersecurity researchers have demonstrated a new technique that exploits a critical security flaw in
October 26th, 2023 | 🕒
iSpeech Oct 26, 2023NewsroomData Security / Vulnerability A group of academics has devised a novel side-channel attack dubbed iLeakage that
September 21st, 2023 | 🕒
iSpeech.org Sep 21, 2023THNVulnerability / Exploit A malicious actor released a fake proof-of-concept (PoC) exploit for a recently disclosed WinRAR
Gloss