Threat actors continue to adapt to the latest technologies, practices, and even data privacy laws—and it’s up to organizations to stay one...
Cyble Research and Intelligence Labs (CRIL) detected threat Actors (TAs) distributing the malware DarkTortilla. Since 2015, the complex .NET-based malware known as DarkTortilla...
Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls
A Rust variant of a ransomware strain known as Agenda has been observed in the wild, making it the latest malware to...
Meta Platforms disclosed that it took down no less than 200 covert influence operations since 2017 spanning roughly 70 countries across 42...
Cybersecurity is a rapidly growing field with a lot of potential. Not only do cyberattacks have the potential to devastate an organization...
Mandiant recently identified that in a targeted attack on Ukrainian government entities, trojanized ISO files were used by threat actors to cloak...
Samba has released software updates to remediate multiple vulnerabilities that, if successfully exploited, could allow an attacker to take control of affected...
An open and unprotected database with 9,098,506 records of credit card transactions was discovered recently by security researcher Jeremiah Fowler and the...
EPM is one of the main public suppliers of electricity, water, and gas in Colombia, and it serves 123 towns. It also...
Researchers from HackSys Inc. have provided further information on a security issue in the code execution of Foxit PDF Reader. On vulnerable...
A Meta-Phish attack that could lead to the loss of personally identifiable information (PII), login information, and a Facebook profile link was...
The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them...
This week, an announcement was made by TPG Telecom in Australia stating that an unidentified threat actor had acquired unauthorized access to...
The Securities and Exchange Commission (SEC) has just announced that it will be filing charges against eight individuals in connection with a...
Microsoft has revised the severity of a security vulnerability it originally patched in September 2022, upgrading it to “Critical” after it emerged...
To perform HTML smuggling, the QBot malware phishing campaigns utilize SVG image files as a method of distribution. This method creates a...
Web applications, often in the form of Software as a Service (SaaS), are now the cornerstone for businesses all over the world....
The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 48 domains that offered services to conduct distributed denial-of-service (DDoS)...
Phishing campaigns involving the Qakbot malware are using Scalable Vector Graphics (SVG) images embedded in HTML email attachments. The new distribution method...
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data
GitLab Releases Patch for Critical CI/CD Pipeline Vulnerability and 13 Others
8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Researchers Warn of Flaws in Widely Used Industrial Gas Analysis Equipment
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
Prompt Injection Flaw in Vanna AI Exposes Databases to RCE Attacks
Russian National Indicted for Cyber Attacks on Ukraine Before 2022 Invasion
Critical SQLi Vulnerability Found in Fortra FileCatalyst Workflow Application
Exploit Attempts Recorded Against New MOVEit Transfer Vulnerability – Patch ASAP!
Practical Guidance For Securing Your Software Supply Chain
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
New Attack Technique Exploits Microsoft Management Console Files
How to Cut Costs with a Browser Security Platform
Multiple WordPress Plugins Compromised: Hackers Create Rogue Admin Accounts
Google Introduces Project Naptime for AI-Powered Vulnerability Research
Critical RCE Vulnerability Discovered in Ollama AI Infrastructure Tool
RedJuliett Cyber Espionage Campaign Hits 75 Taiwanese Organizations