A security vulnerability has been disclosed in the LiteSpeed Cache plugin for WordPress that...
The malicious code inserted into the open-source library XZ Utils, a widely used package...
A security flaw impacting the Lighttpd web server used in baseboard management controllers (BMCs)...
The maintainers of the PuTTY Secure Shell (SSH) and Telnet client are alerting users...
Red Hat on Friday released an “urgent security alert” warning that two versions of...
Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of malware such as Agent Tesla,...
All developers want to create secure and dependable software. They should feel proud to release their code with the full confidence they...
A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking...
Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a nascent malware loader believed...
The threat actors behind the Windows-based Grandoreiro banking trojan have returned in a global campaign since March 2024 following a law enforcement...
The cryptojacking group known as Kinsing has demonstrated an ability to continuously evolve and adapt, proving to be a persistent threat by...
Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by the China-linked BlackTech hacking group...
The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea’s Reconnaissance General Bureau (RGB), has been observed...
Researchers have discovered a new security vulnerability stemming from a design flaw in the IEEE 802.11 Wi-Fi standard that tricks victims into...
The North Korea-linked Kimsuky hacking group has been attributed to a new social engineering attack that employs fictitious Facebook accounts to targets...
The Microsoft Threat Intelligence team said it has observed a threat actor it tracks under the name Storm-1811 abusing the client management...
Google has rolled out fixes to address a set of nine security issues in its Chrome browser, including a new zero-day that...
Law enforcement agencies have officially seized control of the notorious BreachForums platform, an online bazaar known for peddling stolen data, for the...
Google is unveiling a set of new features in Android 15 to prevent malicious apps installed on the device from capturing sensitive...
An unnamed European Ministry of Foreign Affairs (MFA) and its three diplomatic missions in the Middle East were targeted by two previously...
Here’s How to Enhance Your Cyber Resilience with CVSS In late 2023, the Common Vulnerability Scoring System (CVSS) v4.0 was unveiled, succeeding...
A malware botnet called Ebury is estimated to have compromised 400,000 Linux servers since 2009, out of which more than 100,000 were...
Microsoft has addressed a total of 61 new security flaws in its software as part of its Patch Tuesday updates for May...
Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be exploited by threat actors to access sensitive...
Google on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser that has come under active...
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail
Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign
Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks
Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions
(Cyber) Risk = Probability of Occurrence x Damage
Ebury Botnet Malware Compromises 400,000 Linux Servers Over Past 14 Years
Microsoft Patches 61 Flaws, Including Two Actively Exploited Zero-Days
VMware Patches Severe Security Flaws in Workstation and Fusion Products
New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation