According to security researcher Bobby Raunch, the attack exploits the way Lost Mode of AirTags is set up. Although Apple’s Bluetooth-enabled item...
A previously undocumented “flexible” backdoor called Kapeka has been “sporadically” observed in cyber attacks...
Threat actors are exploiting unpatched Atlassian servers to deploy a Linux variant of Cerber...
Cybersecurity researchers have discovered a new campaign that’s exploiting a recently disclosed security flaw...
The threat actor tracked as TA558 has been observed leveraging steganography as an obfuscation...
New cybersecurity research has found that command-line interface (CLI) tools from Amazon Web Services...