admin
December 9, 2023
Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in an effort to make...
admin
December 8, 2023
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset...
admin
December 8, 2023
The North Korean threat actor known as Kimsuky has been observed targeting research institutes in South Korea as part...
admin
December 8, 2023
The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded guilty, nearly 11 months after he...
admin
December 8, 2023
Ransomware attacks have become a significant and pervasive threat in the ever-evolving realm of cybersecurity. Among the various...
admin
December 8, 2023
Unauthorized websites distributing trojanized versions of cracked software have been found to infect Apple macOS users with...
admin
December 8, 2023
WordPress has released version 6.4.2 with a patch for a critical security flaw that could be exploited...
admin
December 7, 2023
The threat actor known as COLDRIVER has continued to engage in credential theft activities against entities that...
admin
December 7, 2023
Meta has officially begun to roll out support for end-to-end encryption (E2EE) in Messenger for personal calls and one-to-one...
admin
December 7, 2023
A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux,...
admin
December 7, 2023
Humans are complex beings with consciousness, emotions, and the capacity to act based on thoughts. In the...
admin
December 7, 2023
Threat intelligence refers to gathering, processing, and analyzing cyber threats, along with proactive defensive measures aimed at...
admin
December 7, 2023
Unspecified governments have demanded mobile push notification records from Apple and Google users to pursue people of...
admin
December 7, 2023
A previously unknown Linux remote access trojan called Krasue has been observed targeting telecom companies in Thailand...
admin
December 6, 2023
Threat actors can take advantage of Amazon Web Services Security Token Service (AWS STS) as a way...
admin
December 6, 2023
Compromising the browser is a high-return target for adversaries. Browser extensions, which are small software modules that...
admin
December 6, 2023
A collection of 21 security flaws have been discovered in Sierra Wireless AirLink cellular routers and open-source...
admin
December 6, 2023
In an increasingly complex and fast-paced digital landscape, organizations strive to protect themselves from various security threats....
admin
December 6, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned of active exploitation of a high-severity Adobe ColdFusion vulnerability by...
admin
December 6, 2023
Atlassian has released software fixes to address four critical flaws in its software that, if successfully exploited, could result...