Cybersecurity researchers are calling attention to a zero-day flaw in Microsoft Office that could be abused to achieve arbitrary code execution on...
It is well known that Meta has implemented sophisticated technology to monitor private messages sent through Facebook and Instagram in order to...
A proof of concept (PoC) code for CVE-2022-22972, a critical vulnerability in some VMware products such as Workspace ONE Access, Identity Manager,...
Details have emerged about a recently patched critical remote code execution vulnerability in the V8 JavaScript and WebAssembly engine used in Google...
Today’s modern companies are built on data, which now resides across countless cloud apps. Therefore preventing data loss is essential to your...
A non-fungible token (NFT) collector lost more than $1.4 million due to a cyberattack involving a malicious website and social engineering tactics....
Black Cat ransomware group claims to have hacked some computer systems in the state of Carinthia, Austria, demanding a ransom of $5...
Cisco Talos researchers detected multiple critical vulnerabilities in Open Automation Software Platform, a solution powered by a universal data connector that allows...
Tech firm NETGEAR released a security alert related to multiple vulnerabilities in the BR200 and BR500 routers. As per the report, a...
A malvertising threat is witnessing a new surge in activity since its emergence earlier this year. Dubbed ChromeLoader, the malware is a...
Securities and Exchange Board of India (SEBI) has released another update for its “Cyber Security and Cyber Resilience Framework,” establishing a considerably...
A recent investigation details how an unidentified hacking group compromised the email accounts of entities linked to the Russian government using four...
Tails, well-known Linux distribution, has asked its users not to use the Tor Browser included with the operating system after detecting a...
If one word could sum up the 2021 infosecurity year (well, actually three), it would be these: “supply chain attack”. A software...
An unknown advanced persistent threat (APT) group has been linked to a series of spear-phishing attacks targeting Russian government entities since the...
A group of Democratic Party senators sent a letter to the U.S. Federal Trade Commission (FTC) urging them to take steps to...
Researchers report that ctx Python, one of the most popular packages of the Python programming language, would have been compromised by threat...
Let’s face it: we all use email, and we all use passwords. Passwords create inherent vulnerability in the system. The success rate...
Cybersecurity researchers have disclosed details of the latest version of the Chaos ransomware line, dubbed Yashma. “Though Chaos ransomware builder has only...
Even as the operators of Conti threatened to overthrow the Costa Rican government, the notorious cybercrime gang officially took down its attack...
ZuoRAT Malware Hijacking Home-Office Routers to Spy on Targeted Networks
OpenSSL to Release Security Patch for Remote Memory Corruption Vulnerability
New Android Banking Trojan ‘Revive’ Targeting Users of Spanish Financial Services
Cybersecurity Experts Warn of Emerging Threat of “Black Basta” Ransomware
Researchers Warn of ‘Matanbuchus’ Malware Campaign Dropping Cobalt Strike Beacons
5 ways cybercriminals steal credit card details
Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware
State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks
Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside
Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks
Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine
Europol Busts Phishing Gang Responsible for Millions in Losses
RIG Exploit Kit Now Infects Victims’ PCs With Dridex Instead of Raccoon Stealer
New ToddyCat Hacker Group on Experts’ Radar After Targeting MS Exchange Servers
Mitigate Ransomware in a Remote-First World
Former Amazon Employee Found Guilty in 2019 Capital One Data Breach
Do You Have Ransomware Insurance? Look at the Fine Print
BRATA Android Malware Gains Advanced Mobile Threat Capabilities
Over a Dozen Flaws Found in Siemens’ Industrial Network Management System
Atlassian Confluence Flaw Being Used to Deploy Ransomware and Crypto Miners