Juniper Networks, a company that manufactures widely used networking equipment as well as security solutions, has issued a warning about vulnerabilities that...
New findings show that malicious actors could leverage a sneaky malware detection evasion technique and bypass endpoint security solutions by manipulating the...
Unpatched Citrix NetScaler systems exposed to the internet are being targeted by unknown threat actors in what’s suspected to be a ransomware...
Following the disclosure of a serious flaw in the Microsoft Power Platform, researchers in the field of information security are advising users...
Two U.K. teenagers have been convicted by a jury in London for being part of the notorious LAPSUS$ (aka Slippy Spider) transnational...
The Internet of Things (IoT) is now experiencing its zenith and is quickly growing its capabilities. This is being accomplished through the...
A high-severity security flaw has been disclosed in the WinRAR utility that could be potentially exploited by a threat actor to achieve...
Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them as exit...
This summer, hundreds of thousands of people will be preparing to take off while sitting back, relaxing, and using the airplane mode...
An ongoing campaign targeting ministries of foreign affairs of NATO-aligned countries points to the involvement of Russian threat actors. The phishing attacks...
Nearly 2,000 Citrix NetScaler instances have been compromised with a backdoor by weaponizing a recently disclosed critical security vulnerability as part of...
It is possible to remotely hack ATMs by taking advantage of a number of vulnerabilities that have been found in the ScrutisWeb...
Those that work with databases on a regular basis will know that PostgreSQL is more than just a name. It has an...
Researchers in the field of information security at Horizon3 have made public the proof-of-concept (PoC) code for a major privilege escalation vulnerability...
Hackers associated with China’s Ministry of State Security (MSS) have been linked to attacks in 17 different countries in Asia, Europe, and...
Attackers are still focusing their attention on Microsoft identities in the hopes of breaking into linked Microsoft apps and federated SaaS applications....
Magniber Ransomware was first detected in late 2017; it targeted South Korean users through malvertising attacks using the Magnitude Exploit Kit. It had...
The notorious Hacktivists group, Known as Mysterious Team Bangladesh, exploits vulnerable versions of PHPMyAdmin and WordPress. It conducts DDoS and defacement attacks...
Hundreds of Citrix NetScaler ADC and Gateway servers have been breached by malicious actors to deploy web shells, according to the Shadowserver...
ChatGPT and its AI cousins have undergone extensive testing and modifications to ensure that they cannot be coerced into spitting out offensive...
Threat actors targeting macOS have increased lately as there were several cases of macOS information stealer malware found in the past, and...