A new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor’s offices and courts. “Although it disguises...
Cybersecurity researchers have discovered a security vulnerability that exposes cars from Honda, Nissan, Infiniti, and Acura to remote attacks through a connected...
The maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be...
The mobile security firm Zimperium has recently issued a warning about a Trojan called “Schoolyard Bully,” which is actively masquerading as an...
Because companies either do not teach their staff enough or have inadequate email security measures in place, many firms, ranging from start-ups to...
Recently, Mandiant Managed Defense discovered cyber espionage activity that focuses on the Philippines and mainly uses USB drives as an initial infection...
Search giant Google on Friday released an out-of-band security update to fix a new actively exploited zero-day flaw in its Chrome web...
Platform certificates, also known as platform keys, are used by OEM Android device makers to certify the core ROM images of their...
The remote code execution vulnerability that affected Visual Studio Code and was fixed by Microsoft in October was the subject of a...
It turns out that Akamai’s team of researchers accidentally killed a newly discovered cryptocurrency mining botnet known as KmsdBot during the investigation....
IBM has fixed a high-severity security vulnerability affecting its Cloud Databases (ICD) for PostgreSQL product that could be potentially exploited to tamper...
A previously undocumented Go-based malware is targeting Redis servers with the goal of taking control of the infected systems and likely building...
The threat actors behind Cuba (aka COLDDRAW) ransomware have received more than $60 million in ransom payments and compromised over 100 entities...
A recently discovered security flaw in the Linux kernel might be exploited locally by an attacker to get elevated privileges on susceptible...
Another data breach has occurred this year as a direct result of the master password vault known as “LastPass.” According to LastPass,...
A Barcelona-based surveillanceware vendor named Variston IT is said to have surreptitiously planted spyware on targeted devices by exploiting several zero-day flaws...
Medibank on Thursday confirmed that the threat actors behind the devastating cyber attack have posted another dump of data stolen from its...
A critical security vulnerability has been disclosed in the Quarkus Java framework that could be potentially exploited to achieve remote code execution...
More than 300,000 users across 71 countries have been victimized by a new Android threat campaign called the Schoolyard Bully Trojan. Mainly...
An ongoing analysis into an up-and-coming cryptocurrency mining botnet known as KmsdBot has led to it being accidentally taken down. KmsdBot, as...
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data
GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability – Patch ASAP!
Practical Guidance For Securing Your Software Supply Chain
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
New Attack Technique Exploits Microsoft Management Console Files
How to Cut Costs with a Browser Security Platform
Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations