The cyber espionage group known as Bahamut has been attributed as behind a highly targeted campaign that infects users of Android devices...
It pays not to let your guard down during the shopping bonanza – watch out for some of the most common scams...
The Android banking fraud malware known as SharkBot has reared its head once again on the official Google Play Store, posing as...
Companies based in the U.S. have been at the receiving end of an “aggressive” Qakbot malware campaign that leads to Black Basta...
It is common knowledge that maintaining a high level of cyber security has rapidly become one of the top priorities for businesses...
Redhat has just just published a risk advisory about a vulnerability in the Linux Kernel that allows for local privilege escalation. This...
The operators of the Ducktail information stealer have demonstrated a “relentless willingness to persist” and continued to update their malware as part...
In order to steal cryptocurrency and clipboard contents, ViperSoftX was detected by the security analysts at Avast, a Windows malware that is...
Microsoft on Tuesday disclosed the intrusion activity aimed at Indian power grid entities earlier this year likely involved the exploitation of security...
Mastodon has been under the limelight as a result of the exodus of former Twitter users who left the platform in response...
A malicious extension for Chromium-based web browsers has been observed to be distributed via a long-standing Windows information stealer called ViperSoftX. Czech-based...
The following techniques have been made public by a researcher who wishes to remain anonymous. They can be used to bypass certain of...
A nascent Go-based malware known as Aurora Stealer is being increasingly deployed as part of multiple campaigns designed to steal sensitive information...
The Luna Moth campaign has extorted hundreds of thousands of dollars from several victims in the legal and retail sectors. The attacks...
Security researchers at Cyble recently identified that the authors of ransomware now have access to a brand new malicious tool – AXLocker...
The cybercrime group called Daixin Team has leaked sample data belonging to AirAsia, a Malaysian low-cost airline, on its data leak portal....
Google has won a lawsuit filed against two Russian nationals in connection with the operation of a botnet called Glupteba, the company...
An extensive phishing campaign targeting businesses in numerous upright markets, including retail, was discovered by Cyjax recently in which the attackers exploited...
The Indian government on Friday released a draft version of the much-awaited data protection regulation, making it the fourth such effort since...
A developing threat activity cluster has been found using Google Ads in one of its campaigns to distribute various post-compromise payloads, including...
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data
GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability – Patch ASAP!
Practical Guidance For Securing Your Software Supply Chain
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
New Attack Technique Exploits Microsoft Management Console Files
How to Cut Costs with a Browser Security Platform
Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations