Two crucial flaws in the firmware of several corporate printer models have been made public by Hewlett Packard. If exploited, these flaws...
It pays to do some research before taking a leap into the world of internet-connected toys
Atlanta-based cyber risk intelligence company, Cyble discovered a new Remote Access Trojan (RAT) malware. What makes this particular RAT malware distinct enough...
The Cyber Security Agency of the United States (CISA) added to its catalog of vulnerabilities that are being actively exploited a recently...
Today’s web has made hackers’ tasks remarkably easy. For the most part, hackers don’t even have to hide in the dark recesses...
OpenSSL is a famous cryptography library that provides an open source implementation of the Secure Sockets Layer (SSL) and Transport Layer Security...
A HackerOne employee had improperly accessed vulnerability reports submitted to the platform by security researchers’ for personal gain. The employee anonymously took...
Your smartphone is your daily companion. The chances are that most of our activities rely on them, from ordering food to booking...
The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the U.S., Canada, the U.K., Australia, and New Zealand within...
The operators behind BRATA have once again added more capabilities to the Android mobile malware in an attempt to make their attacks...
It is well known that Meta has implemented sophisticated technology to monitor private messages sent through Facebook and Instagram in order to...
The U.S. Drug Enforcement Administration (DEA) reports that it has begun an investigation into alleged cyberattacks that would have compromised up to...
Cybercriminal groups have been exploiting a critical vulnerability in F5 BIG-IP solutions to erase file systems on affected devices, rendering servers completely...
With the ongoing conflict in Eurasia, cyberwarfare is inevitably making its presence felt. The fight is not only being fought on the...
OK, so 2021 wasn’t a good year, and 2022 hasn’t fared any better where cybersecurity and vulnerabilities are concerned. Ubisoft is one...
Unpatched software is a computer code containing known security weaknesses. Unpatched vulnerabilities refer to weaknesses that allow attackers to leverage a known...
Microsoft has warned of emerging threats in the Web3 landscape, including “ice phishing” campaigns, as a surge in adoption of blockchain and...
We hear about the need for better visibility in the cybersecurity space – detecting threats earlier and more accurately. We often hear...
Cybersecurity specialists report that hacking groups are actively exploiting CVE-2021-20038, a severe vulnerability in SonicWall Secure Mobile Access (SMA) gateways, fixed in...
Different government agencies based in the United States have joined together in issuing cybersecurity advisory. The advisory was a summation of cyber...
The U.S. Department of Justice (DOJ) announced the arrest of Nickolas Sharp, an individual accused by the Federal Bureau of Investigation (FBI)...