admin
May 6, 2024
Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that's designed to set up...
admin
May 4, 2024
Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign...
admin
May 3, 2024
In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more...
admin
May 3, 2024
Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection.
This is done to "facilitate communications...
admin
May 3, 2024
SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of...
admin
May 3, 2024
The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors' attempts...
admin
May 3, 2024
Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than...
admin
May 3, 2024
HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that...
admin
May 2, 2024
Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be...
admin
May 2, 2024
A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay...
admin
May 2, 2024
Like antivirus software, vulnerability scans rely on a database of known weaknesses.
That’s why websites like VirusTotal exist,...
admin
May 2, 2024
Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors,...
admin
May 2, 2024
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of...
admin
May 2, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited...
admin
May 2, 2024
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through...
admin
May 1, 2024
A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated...
admin
May 1, 2024
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as...
admin
May 1, 2024
There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to...
admin
May 1, 2024
The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it's based on,...
admin
May 1, 2024
A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years...
