The Iranian threat actor known as MuddyWater is continuing its time-tested tradition of relying on legitimate remote administration tools to commandeer targeted...
Security researchers have uncovered fresh malware with hacking capabilities comparable to those of Pegasus, which was developed by NSO Group. The software,...
The maintainers of the vm2 JavaScript sandbox module have shipped a patch to address a critical flaw that could be abused to...
The Near-Ultrasound Invisible Trojan, or NUIT, was developed by a team of researchers from the University of Texas at San Antonio and...
Security vulnerabilities in remote desktop programs such as Sunlogin and AweSun are being exploited by threat actors to deploy the PlugX malware....
Fortinet has released fixes to address 15 security flaws, including one critical vulnerability impacting FortiOS and FortiProxy that could enable a threat...
Security researchers have discovered yet another sizable haul of malicious packages on the open source registries npm and PyPI. These packages, which...
GoTo, a company that provides software, said on Monday, January 23, that a hacker had stolen encrypted backups for its Central, Pro,...
The maintainers of the Git source code version control system have released updates to remediate two critical vulnerabilities that could be exploited...
Nintendo has secretly released a fix for a security flaw that might have allowed hackers to access compromised Switch, 3DS, and Wii...
The use after free vulnerability, which is linked to ksmbd, affects computers running Linux distributions powered by kernels earlier than 5.15.61. This...
Splunk Inc. is a San Francisco, California-based American software firm that develops Web-based software for finding, monitoring, and analyzing machine-generated data. Splunk...
Researchers from HackSys Inc. have provided further information on a security issue in the code execution of Foxit PDF Reader. On vulnerable...
On Tuesday, CISA updated its catalog with five new vulnerabilities, including those that affect products made by Veeam, Fortinet, Microsoft, and Citrix....
Customers were warned by Cisco on Thursday that fixes for a high-severity vulnerability that affects certain of the company’s IP phones are...
A free operating system that is similar to Unix and Berkeley Unix is called FreeBSD. It is derived from Research Unix via...
Cybersecurity researchers have discovered a security vulnerability that exposes cars from Honda, Nissan, Infiniti, and Acura to remote attacks through a connected...
The maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be...
The remote code execution vulnerability that affected Visual Studio Code and was fixed by Microsoft in October was the subject of a...
Researchers at Zimperium zLabs recently identified a new Chrome browser botnet called ‘Cloud9’ that is intent on stealing the following information using...
A flaw in the Galaxy Store enables remote adversaries to trigger the installation and/or start of an application, resulting in the execution...