admin
November 28, 2023
The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed...
admin
November 28, 2023
If forecasters are right, over the course of today, consumers will spend $13.7 billion. Just about every click,...
admin
November 27, 2023
A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host...
admin
November 27, 2023
The U.K. and U.S., along with international partners from 16 other countries, have released new guidelines for...
admin
November 25, 2023
An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in what’s suspected...
admin
November 25, 2023
The maintainers of the open-source file-sharing software ownCloud have warned of three critical security flaws that could...
admin
November 24, 2023
More details have emerged about a malicious Telegram bot called Telekopye that's used by threat actors to pull off...
admin
November 24, 2023
The title of this article probably sounds like the caption to a meme. Instead, this is an...
admin
November 24, 2023
Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called SysJoker, which is assessed...
admin
November 24, 2023
Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at risk of...
admin
November 23, 2023
A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to deliver malware capable...
admin
November 23, 2023
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab.
"The malware...
admin
November 23, 2023
A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application...
admin
November 23, 2023
Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals....
admin
November 23, 2023
An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality to rope...
admin
November 22, 2023
A new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows Hello authentication on Dell Inspiron...
admin
November 22, 2023
North Korean threat actors have been linked to two campaigns in which they masquerade as both job...
admin
November 22, 2023
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI...
admin
November 22, 2023
The macOS information stealer known as Atomic is now being delivered to target via a bogus web...
admin
November 22, 2023
Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical security flaw in Citrix NetScaler...