Recent articles
-
Critical Insights on BlackLock Ransomware and Its Exposed Vulnerabilities
In the volatile realm of cybersecurity, ransomware threats persistently evolve and adapt. The recent exposure of vulnerabilities within the BlackLock…
-
Critical Vulnerabilities in Solar Inverters by Sungrow, Growatt, and SMA: 46 Flaws Exposed
With the increasing reliance on renewable energy sources, the security of solar inverter systems has never been more critical. Recent…
-
CoffeeLoader Malware: GPU-Based Techniques to Evade Detection
Cybersecurity professionals are increasingly concerned about advanced malware threats like CoffeeLoader, which employs sophisticated techniques to evade detection by endpoint…
-
PJobRAT Malware Targets Taiwanese Users via Fake Chat Apps
The rise of sophisticated malware techniques has led to alarming threats targeting unsuspecting users worldwide. One striking example is the…
-
Morphing Meerkat Phishing Kit: A Grave New Threat
Cybersecurity is an ever-evolving battlefield, with new threats continuously emerging. One of the most concerning developments is the rise of…
Author Details

Iulian Rotaru
Helping Businesses Stay Secure
Freelance Penetration Tester
Ethical Hacker
Cybersecurity Researcher