It’s all fun and games over the holidays, but is your young gamer safe...
After a hacker offered data from more than 200 million Deezer subscribers for sale...
A group of Chinese researchers have just released a paper in which they make...
Cybersecurity researchers have discovered a new information stealer dubbed SYS01stealer targeting critical government infrastructure...
A Russia-linked threat actor has been observed deploying a new information-stealing malware in cyber...
OpenAI on Friday disclosed that a bug in the Redis open source library was responsible for the exposure of other users’ personal...
Telecommunication providers in the Middle East are the subject of new cyber attacks that commenced in the first quarter of 2023. The...
German and South Korean government agencies have warned about cyber attacks mounted by a threat actor tracked as Kimsuky using rogue browser...
The North Korean advanced persistent threat (APT) actor dubbed ScarCruft is using weaponized Microsoft Compiled HTML Help (CHM) files to download additional...
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in South and...
Poorly managed Linux SSH servers are being targeted as part of a new campaign that deploys different variants of a malware called...
As many as 55 zero-day vulnerabilities were exploited in the wild in 2022, with most of the flaws discovered in software from...
A banking trojan dubbed Mispadu has been linked to multiple spam campaigns targeting countries like Bolivia, Chile, Mexico, Peru, and Portugal with...
2022 was the year when inflation hit world economies, except in one corner of the global marketplace – stolen data. Ransomware payments...
The threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to evade detection...
The notorious Emotet malware, in its return after a short hiatus, is now being distributed via Microsoft OneNote email attachments in an...
U.S. law enforcement authorities have arrested a New York man in connection with running the infamous BreachForums hacking forum under the online...
U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated...
An Android voice phishing (aka vishing) malware campaign known as FakeCalls has reared its head once again to target South Korean users...
In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser is now...
Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android and Windows...
The advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India, Lithuania, Slovakia, and the...
Threat activity clusters affiliated with the Chinese and Russian cybercriminal ecosystems have been observed using a new piece of malware that’s designed...
Multiple threat actors, including a nation-state group, exploited a critical three-year-old security flaw in Progress Telerik to break into an unnamed federal...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on March 15 added a security vulnerability impacting Adobe ColdFusion to its Known Exploited...
OpenAI Reveals Redis Bug Behind ChatGPT User Data Exposure Incident
Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers
German and South Korean Agencies Warn of Kimsuky’s Expanding Cyber Attack Tactics
ScarCruft’s Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques
NAPLISTENER: New Malware in REF2924 Group’s Arsenal for Bypassing Detection
New ShellBot DDoS Malware Variants Targeting Poorly Managed Linux Servers
From Ransomware to Cyber Espionage: 55 Zero-Day Vulnerabilities Weaponized in 2022
Mispadu Banking Trojan Targets Latin America: 90,000+ Credentials Stolen
New Cyber Platform Lab 1 Decodes Dark Web Data to Uncover Hidden Supply Chain Breaches
Researchers Shed Light on CatB Ransomware’s Evasion Techniques
Emotet Rises Again: Evades Macro Security via OneNote Attachments
Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York
LockBit 3.0 Ransomware: Inside the Cyberthreat That’s Costing Millions
FakeCalls Vishing Malware Targets South Korean Users via Popular Financial Apps
A New Security Category Addresses Web-borne Threats
Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware
Winter Vivern APT Group Targeting Indian, Lithuanian, Slovakian, and Vatican Officials
Chinese and Russian Hackers Using SILKLOADER Malware to Evade Detection
Multiple Hacker Groups Exploit 3-Year-Old Vulnerability to Breach U.S. Federal Agency
CISA Issues Urgent Warning: Adobe ColdFusion Vulnerability Exploited in the Wild