Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN...
Israeli spyware maker NSO Group deployed at least three novel “zero-click” exploits against iPhones in 2022 to infiltrate defenses erected by Apple...
A previously known Windows-based ransomware strain known as IceFire has expanded its focus to target Linux enterprise networks belonging to several media...
The Zerobot DDoS botnet has received substantial updates that expand on its ability to target more internet-connected devices and scale its network....
On many occasions, security flaws appear that can compromise our devices. They can affect operating systems like Windows, applications, drivers. It is...
A cyber mercenary that “ostensibly sells general security and information analysis services to commercial customers” used several Windows and Adobe zero-day exploits...
Cybersecurity specialists from AT&T Alien Labs report the detection of an Internet of Things (IoT) malware variant targeting content management systems (CMS),...
A nascent Linux-based botnet named Enemybot has expanded its capabilities to include recently disclosed security vulnerabilities in its arsenal to target web...
Google’s Threat Analysis Group (TAG) on Thursday pointed fingers at a North Macedonian spyware developer named Cytrox for developing exploits against five...
The malware known as DirtyMoe has gained new worm-like propagation capabilities that allow it to expand its reach without requiring any user...
A previously undocumented backdoor has been observed targeting Linux systems with the goal of corralling the machines into a botnet and acting...
This week, CISA updated Known Exploited Vulnerabilities Catalog by adding two flaws emanating from Zabbix monitoring solution. The two vulnerabilities, CVE-2022-23134 and...
A ransomware operation identified as Night Sky has been infecting multiple VMware Horizon deployments thanks to the exploitation of the critical vulnerability...
Hackers are Targeting Microsoft Exchange servers using exploits to distribute malware. The vulnerabilities allow hackers to bypass detection by sending emails with...
Sophos researchers has uncovered an unusually clever ransomware gang, that is named as “Cring Ransomware” that Exploits Ancient ColdFusion Server. Here, the...
According to researchers, threat actors including Conti ransomware affiliates are exploiting 3 unpatched vulnerabilities that allow unauthenticated, remote code execution on MS...
Researchers uncovered a new ongoing attack by Conti Ransomware Gang that utilized the ProxyShell to target the organization networks. ProxySell is an...
The security experts of the cybersecurity firm, Volexity have recently reported an attack through which the North Korean Hacker Group using browser...
A set of all-new updates were being released by GitHub on Friday, all the updates pronounce that how the company will deal...
New upgrades have been made to a Python-based “self-replicating, polymorphic bot” called Necro in what’s seen as an attempt to improve its...
Zerodium operators announced a plan to pay up to $100,000 USD for zero-day flaws in Pidgin, the popular instant messaging client for...