admin
May 7, 2024
A Russian operator of a now-dismantled BTC-e cryptocurrency exchange has pleaded guilty to money laundering charges from 2011 to...
admin
May 6, 2024
More than 50% of the 90,310 hosts have been found exposing a Tinyproxy service on the internet that's vulnerable...
admin
May 6, 2024
The recently uncovered cyber espionage campaign targeting perimeter network devices from several vendors, including Cisco, may have been...
admin
May 6, 2024
Cybercriminals are vipers. They’re like snakes in the grass, hiding behind their keyboards, waiting to strike. And if...
admin
May 6, 2024
Multiple security vulnerabilities have been disclosed in various applications and system components within Xiaomi devices running Android.
"The vulnerabilities in...
admin
May 6, 2024
Cybersecurity researchers have discovered a new information stealer targeting Apple macOS systems that's designed to set up...
admin
May 4, 2024
Czechia and Germany on Friday revealed that they were the target of a long-term cyber espionage campaign...
admin
May 3, 2024
In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more...
admin
May 3, 2024
Threat actors have been increasingly weaponizing Microsoft Graph API for malicious purposes with the aim of evading detection.
This is done to "facilitate communications...
admin
May 3, 2024
SaaS applications are dominating the corporate landscape. Their increased use enables organizations to push the boundaries of...
admin
May 3, 2024
The U.S. government on Thursday published a new cybersecurity advisory warning of North Korean threat actors' attempts...
admin
May 3, 2024
Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than...
admin
May 3, 2024
HPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that...
admin
May 2, 2024
Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be...
admin
May 2, 2024
A Ukrainian national has been sentenced to more than 13 years in prison and ordered to pay...
admin
May 2, 2024
Like antivirus software, vulnerability scans rely on a database of known weaknesses.
That’s why websites like VirusTotal exist,...
admin
May 2, 2024
Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors,...
admin
May 2, 2024
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of...
admin
May 2, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited...
admin
May 2, 2024
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through...