admin
May 20, 2024
All developers want to create secure and dependable software. They should feel proud to release their code...
admin
May 20, 2024
An Iranian threat actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as...
admin
May 20, 2024
Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver a variety of...
admin
May 20, 2024
Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a...
admin
May 20, 2024
A "multi-faceted campaign" has been observed abusing legitimate services like GitHub and FileZilla to deliver an array...
admin
May 19, 2024
The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals for allegedly orchestrating a pig...
admin
May 19, 2024
The threat actors behind the Windows-based Grandoreiro banking trojan have returned in a global campaign since March 2024 following...
admin
May 17, 2024
A new report from XM Cyber has found – among other insights - a dramatic gap between where most...
admin
May 17, 2024
Cybersecurity researchers have shed more light on a remote access trojan (RAT) known as Deuterbear used by...
admin
May 17, 2024
The cryptojacking group known as Kinsing has demonstrated its ability to continuously evolve and adapt, proving to be a...
admin
May 17, 2024
The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked to North Korea's Reconnaissance General Bureau (RGB),...
admin
May 17, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting D-Link routers to its...
admin
May 16, 2024
Researchers have discovered a new security vulnerability stemming from a design flaw in the IEEE 802.11 Wi-Fi...
admin
May 16, 2024
The North Korea-linked Kimsuky hacking group has been attributed to a new social engineering attack that employs fictitious Facebook...
admin
May 16, 2024
Security researchers have disclosed almost a dozen security flaws impacting the GE HealthCare Vivid Ultrasound product family...
admin
May 16, 2024
The Microsoft Threat Intelligence team said it has observed a threat it tracks under the name Storm-1811 abusing the client...
admin
May 16, 2024
Google has rolled out fixes to address a set of nine security issues in its Chrome browser, including a...
admin
May 16, 2024
Law enforcement agencies have officially seized control of the notorious BreachForums platform, an online bazaar known for peddling stolen...
admin
May 15, 2024
Here’s How to Enhance Your Cyber Resilience with CVSS
In late 2023, the Common Vulnerability Scoring System (CVSS)...
admin
May 15, 2024
Google is unveiling a set of new features in Android 15 to prevent malicious apps installed on...