admin
January 22, 2024
Cybersecurity researchers have discovered a new Java-based "sophisticated" information stealer that uses a Discord bot to exfiltrate...
admin
January 22, 2024
Media organizations and high-profile experts in North Korean affairs have been at the receiving end of a...
admin
January 22, 2024
Several public and popular libraries abandoned but still used in Java and Android applications have been found...
admin
January 22, 2024
The U.S. Federal Trade Commission (FTC) is continuing to clamp down on data brokers by prohibiting InMarket...
admin
January 22, 2024
Cybersecurity researchers are warning of a "notable increase" in threat actor activity actively exploiting a now-patched flaw...
admin
January 20, 2024
An advanced China-nexus cyber espionage group previously linked to the exploitation of security flaws in VMware and...
admin
January 20, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday issued an emergency directive urging Federal Civilian Executive Branch...
admin
January 20, 2024
Microsoft on Friday revealed that it was the target of a nation-state attack on its corporate systems...
admin
January 20, 2024
The threat actor tracked as TA866 has resurfaced after a nine-month hiatus with a new large-volume phishing campaign to...
admin
January 19, 2024
Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of granting attackers remote...
admin
January 19, 2024
In the current digital landscape, data has emerged as a crucial asset for organizations, akin to currency....
admin
January 19, 2024
A malicious package uploaded to the npm registry has been found deploying a sophisticated remote access trojan...
admin
January 19, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical flaw impacting Ivanti Endpoint Manager...
admin
January 18, 2024
Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying...
admin
January 18, 2024
The Russia-linked threat actor known as COLDRIVER has been observed evolving its tradecraft to go beyond credential...
admin
January 18, 2024
Continuous integration and continuous delivery (CI/CD) misconfigurations discovered in the open-source TensorFlow machine learning framework could have been exploited...
admin
January 18, 2024
In today's digital landscape, traditional password-only authentication systems have proven to be vulnerable to a wide range...
admin
January 18, 2024
Multiple security vulnerabilities have been disclosed in the TCP/IP network protocol stack of an open-source reference implementation...
admin
January 18, 2024
High-profile individuals working on Middle Eastern affairs at universities and research organizations in Belgium, France, Gaza, Israel,...
admin
January 17, 2024
The point-of-sale (PoS) terminals from PAX Technology are impacted by a collection of high-severity vulnerabilities that can...