admin
December 11, 2023
A new collection of eight process injection techniques, collectively dubbed PoolParty, could be exploited to achieve code execution...
admin
December 11, 2023
In the ever-evolving cybersecurity landscape, one method stands out for its chilling effectiveness – social engineering. But...
admin
December 11, 2023
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively...
admin
December 9, 2023
Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel attack called SLAM that could be exploited to...
admin
December 9, 2023
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make...
admin
December 8, 2023
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset...
admin
December 8, 2023
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part...
admin
December 8, 2023
The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty, nearly 11 months after he...
admin
December 8, 2023
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various...
admin
December 8, 2023
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with...
admin
December 8, 2023
WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited...
admin
December 7, 2023
The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that...
admin
December 7, 2023
Meta has officially begun to roll out support for end-to-end encryption (E2EE) in Messenger for personal calls and one-to-one...
admin
December 7, 2023
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux,...
admin
December 7, 2023
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the...
admin
December 7, 2023
Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at...
admin
December 7, 2023
Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue people of...
admin
December 7, 2023
A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies in Thailand...
admin
December 6, 2023
Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way...
admin
December 6, 2023
Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules that...