Today’s web has made hackers’ tasks remarkably easy. For the most part, hackers don’t even have to hide in the dark recesses...
Web infrastructure company Cloudflare on Tuesday disclosed at least 76 employees and their family members received text messages on their personal and...
A new IoT botnet malware dubbed RapperBot has been observed rapidly evolving its capabilities since it was first discovered in mid-June 2022....
Twitter on Friday revealed that a now-patched zero-day bug was used to link phone numbers and emails to user accounts on the...
A threat actor working to further Iranian goals is said to have been behind a set of damaging cyberattacks against Albanian government...
The U.S. Department of Homeland Security (DHS) has warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. If left...
A nascent service called Dark Utilities has already attracted 3,000 users for its ability to provide command-and-control (C2) services with the goal...
As many as 29 different router models from DrayTek have been identified as affected by a new critical, unauthenticated remote code execution...
An unknown threat actor has been targeting Russian entities with a newly discovered remote access trojan called Woody RAT for at least...
A threat actor is said to have “highly likely” exploited a security flaw in an outdated Atlassian Confluence server to deploy a...
Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust relationships and...
Researchers have disclosed a new offensive framework referred to as Manjusaka that they call is a “Chinese sibling of Sliver and Cobalt...
Ransomware is a kind of malware used by cybercriminals to stop users from accessing their systems or files; the cybercriminals then threaten...
The operators of the Gootkit access-as-a-service (AaaS) malware have resurfaced with updated techniques to compromise unsuspecting victims. “In the past, Gootkit used...
Microsoft on Friday disclosed a potential connection between the Raspberry Robin USB-based worm and an infamous Russian cybercrime group tracked as Evil...
A threat actor operating with interests aligned with North Korea has been deploying a malicious extension on Chromium-based web browsers that’s capable...
A malicious campaign leveraged seemingly innocuous Android dropper apps on the Google Play Store to compromise users’ devices with banking malware. These...
Spanish law enforcement officials have announced the arrest of two individuals in connection with a cyberattack on the country’s radioactivity alert network...
A cyber mercenary that “ostensibly sells general security and information analysis services to commercial customers” used several Windows and Adobe zero-day exploits...
As many as 30 malicious Android apps with cumulative downloads of nearly 10 million have been found on the Google Play Store...
Cybersecurity researchers have reiterated similarities between the latest iteration of the LockBit ransomware and BlackMatter, a rebranded variant of the DarkSide ransomware...