Nintendo has secretly released a fix for a security flaw that might have allowed hackers to access compromised Switch, 3DS, and Wii...
Phishing campaigns involving the Qakbot malware are using Scalable Vector Graphics (SVG) images embedded in HTML email attachments. The new distribution method...
Make sure that the device that’s supposed to help you keep tabs on your little one isn’t itself a privacy and security...
The cybersecurity analysts at Zscaler ThreatLabz have recently detected a new malicious version of a multi-factor-authentication (MFA) solution, known as Kavach, which...
HelpSystems, the company behind the Cobalt Strike software platform, has released an out-of-band security update to address a remote code execution vulnerability...
In a coordinated operation on October 10 throughout the three nations, 31 people were detained. A total of 22 addresses were raided,...
Two security flaws in WhatsApp’s chat app for iOS and Android that might have been used to remotely execute malware on the device...
China has accused the U.S. National Security Agency (NSA) of conducting a string of cyberattacks aimed at aeronautical and military research-oriented Northwestern...
Entrust is accused by LockBit of being behind the cyberattack. If such were the case, a genuine security firm would never retaliate...
High-tech criminals are increasingly targeting push-start automobiles by hacking into key fobs, leaving many New Orleans car owners stranded according to WSDU...
DigitalOcean has revealed that some of its customers’ emails were exposed to attackers thanks to an attack on the Mailchimp email marketing...
HP has highlighted a new wave of cybercriminals who spread families of ‘malware’ in business environments using files with shortcuts or links...
We can say that Kali Linux is one of the most important distributions in terms of computer security. Now they have released...
Researchers have disclosed a new offensive framework referred to as Manjusaka that they call is a “Chinese sibling of Sliver and Cobalt...
Rolling-PWN attack vulnerability CVE-2021-46145 affecting all Honda cars models that exist from the year 2012 up to the year 2022. This vulnerability...
In a leak that, if verified, could be one of the biggest data breaches in history, hackers might have obtained a wealth...
A new malware has been discovered that actively attacks home and small business routers in Europe and North America. That malware attacks...
An APT group named GALLIUM has recently been using a new and hard-to-detect remote access trojan named PingPull. The trojan is being...
Enforcing the “double-extortion” technique aka pay-now-or-get-breached emerged as a head-turner last year. May 6th, 2022 is a recent example. The State Department...
Last weekend, HDFC Bank clients received a message showing a non-exact balance in their accounts, making them believe they had received a...
A few days ago, the security researcher known as “nao_sec” reported the detection of a file specially crafted Word document to exploit...