A new open source remote access trojan (RAT) called DogeRAT targets Android users primarily located in India as part of a sophisticated...
A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016. Slovak cybersecurity firm...
If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP,...
Bandit Stealer, a recently discovered information stealer by Trend Micro, effectively targets cryptocurrency wallets and web browsers while skillfully avoiding detection. The...
Linux routers in Japan are the target of a new Golang remote access trojan (RAT) called GobRAT. “Initially, the attacker targets a...
A new phishing technique called “file archiver in the browser” can be leveraged to “emulate” a file archiver software in a web...
The research that was published in the German daily Handelsblatt said that customers of Tesla Inc. lodged over 2,400 complaints about difficulties...
A critical security vulnerability has been disclosed in the Open Authorization (OAuth) implementation of the application development framework Expo.io. The shortcoming, assigned...
A new strain of malicious software that’s engineered to penetrate and disrupt critical systems in industrial environments has been unearthed. Google-owned threat...
Email protection and network security services provider Barracuda is warning users about a zero-day flaw that it said has been exploited to...
Zyxel has released software updates to address two critical security flaws affecting select firewall and VPN products that could be abused by...
A Brazilian threat actor is targeting more than 30 Portuguese financial institutions with information-stealing malware as part of a long-running campaign that...
The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of leaked LockBit and Babuk ransomware families...
Antivirus products continuously advance to combat evolving threats, prompting malware developers to create new bypassing techniques like “packing” and “crypting,” GuLoader is...
The Iranian threat actor known as Agrius is leveraging a new ransomware strain called Moneybird in its attacks targeting Israeli organizations. Agrius,...
Google on Wednesday announced the 0.1 Beta version of GUAC (short for Graph for Understanding Artifact Composition) for organizations to secure their...
Barracuda said that some of its customers who use the Email Security Gateway were affected by a hack that occurred the previous...
Researchers from Tencent Labs and Zhejiang University have collaborated to develop a new technique known as “BrutePrint,” which enables the forcible extraction...
Google has removed a screen recording app named “iRecorder – Screen Recorder” from the Play Store after it was found to sneak...
The infamous Lazarus Group actor has been targeting vulnerable versions of Microsoft Internet Information Services (IIS) servers as an initial breach route...
Urgent Security Updates: Cisco and VMware Address Critical Vulnerabilities
Urgent Security Updates: Cisco and VMware Address Critical Vulnerabilities
Barracuda Urges Immediate Replacement of Hacked ESG Appliances
New PowerDrop Malware Targeting U.S. Aerospace Industry
New Malware Campaign Leveraging Satacom Downloader to Steal Cryptocurrency
Over 60K Adware Apps Posing as Cracked Versions of Popular Apps Target Android Devices
Cyclops Ransomware Gang Offers Go-Based Info Stealer to Cybercriminals
MOVEit software zero day vulnerability used to hack British Airways, Boots & BBC employee data
Microsoft: Lace Tempest Hackers Behind Active Exploitation of MOVEit Transfer App
New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
MOVEit Transfer Under Attack: Zero-Day Vulnerability Actively Being Exploited
Evasive QBot Malware Leverages Short-lived Residential IPs for Dynamic Attacks
New Zero-Click Hack Targets iOS Users with Stealthy Root-Privilege Malware
N. Korean ScarCruft Hackers Exploit LNK Files to Spread RokRAT
Critical Firmware Vulnerability in Gigabyte Systems Exposes ~7 Million Devices
Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass
Dark Pink APT Group Leverages TelePowerBot and KamiKakaBot in Sophisticated Attacks
Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
Hack public Wifi networks using WPA2 or WPA3 security & Radius server with new technique
Implementing Risk-Based Vulnerability Discovery and Remediation