admin
October 17, 2024
Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301 after successfully gaining access...
admin
October 16, 2024
Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint...
FIDO Alliance Drafts New Protocol to Simplify Passkey Transfers Across Different Platforms

2 min read
admin
October 16, 2024
The FIDO Alliance said it's working to make passkeys and other credentials more easier to export across...
admin
October 16, 2024
AI from the attacker’s perspective: See how cybercriminals are leveraging AI and exploiting its vulnerabilities to compromise...
admin
October 16, 2024
The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a...
admin
October 16, 2024
To defend your organization against cyber threats, you need a clear picture of the current threat landscape....
admin
October 16, 2024
A new spear-phishing campaign targeting Brazil has been found delivering a banking malware called Astaroth (aka Guildma)...
admin
October 16, 2024
GitHub has released security updates for Enterprise Server (GHES) to address multiple issues, including a critical bug...
admin
October 16, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds...
admin
October 15, 2024
In recent years, the number and sophistication of zero-day vulnerabilities have surged, posing a critical threat to...
admin
October 15, 2024
New variants of an Android banking trojan called TrickMo have been found to harbor previously undocumented features...
admin
October 15, 2024
Cybersecurity researchers have disclosed a new malware campaign that leverages a malware loader named PureCrypter to deliver...
admin
October 15, 2024
North Korean threat actors have been observed using a Linux variant of a known malware family called...
admin
October 15, 2024
China's National Computer Virus Emergency Response Center (CVERC) has doubled down on claims that the threat actor...
admin
October 15, 2024
Cybersecurity researchers have disclosed a new malware campaign that delivers Hijack Loader artifacts that are signed with...
admin
October 15, 2024
The maintainers of the Jetpack WordPress plugin have released a security update to remediate a critical vulnerability...
admin
October 14, 2024
A suspected nation-state adversary has been observed weaponizing three security flaws in Ivanti Cloud Service Appliance (CSA)...
admin
October 14, 2024
The link between detection and response (DR) practices and cloud security has historically been weak. As global...
admin
October 14, 2024
Cybersecurity researchers have found that entry points could be abused across multiple programming ecosystems like PyPI, npm,...
admin
October 14, 2024
Hey there, it's your weekly dose of "what the heck is going on in cybersecurity land" –...