Dozens of Mac device users report that the Zoom video conferencing app keeps their devices’ microphone on even when the app isn’t...
Microsoft has developed multiple protection mechanisms against some popular hacking variants, including the malicious use of macros. Sometimes, threat actors send Office...
In a recent report, the Federal Bureau of Investigation (FBI) Director Christopher Wray attributes responsibility for the largest cyberattack campaigns to the...
A new research methodology has allowed specialists to track active vendors in several dark web platformsbased solely on how they write their...
Cybersecurity specialists from Akamai reported the detection of a malicious campaign based on the abuse of Universal Plug and Play (UPnP) protocols...
This week, Microsoft security teams reported the discovery of a phishing campaign characterized by the inclusion of a novel technique that consists...
It is no secret to anyone that the most dangerous groups of threat actors in the world are always trying to evolve,...
Updating all the software solutions that we use daily is one of the main cybersecurity practices, since it allows us to keep...
For almost five years, SecureList researchers reported the identification of an Advanced Persistent Threat (APT) group apparently linked to the infamous Lazarus...
For various reasons, during the most recent months multiple illegal platforms on the dark web dedicated to the sale of stolen confidential...
The European Space Agency (ESA) has announced a new program that expects to engage the cybersecurity community to keep critical space systems...
In its latest security alert, the Federal Bureau of Investigation (FBI) warns U.S. citizens that those who have shared their phone numbers...
Ghana’s National Service Secretariate – NSS – exposed 55GB worth of citizens’ data when an AWS S3 bucket used by the Secretariate...
Walk-through metal detectors manufactured by well-known U.S.-based firm Garett are vulnerable to remote attacks, according to Cisco Talos. Researchers at Cisco Talos discovered as...
The patch was issued for CVE-2021-40444 to prevent the execution of code that downloaded the Microsoft Cabinet (CAB) archive containing a malicious...
The clients affected by the incident involving a misconfigured Amazon S3 bucket include Global 500 company Ericsson and Fortune 500 company Cisco. ...
One of the users who received an email alert from LastPass stated that it warned them of an unauthorized login attempt using...
According to Max Weinbach of Android Police, “Samsung is hosting literal malware on the Galaxy Store.” It is becoming harder and harder...
The IT security researchers at Google have declared the NSO zero-click iMessage exploit as “Terrifying.” Google Project Zero’s (GPZ) Ian Beer and...
So far, 394 malicious apps have been identified that are spreading Anubis malware to steal financial and personal data from unsuspecting Android...
All a user required was to open Gumtree’s website and press the F12 button on Chrome or Firefox browsers to view users’...