admin
April 9, 2024
Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions that could be...
admin
April 9, 2024
Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect...
admin
April 9, 2024
As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing...
admin
April 9, 2024
Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide...
admin
April 8, 2024
Google has announced support for what's called a V8 Sandbox in the Chrome web browser in an effort to...
admin
April 8, 2024
Threat hunters have discovered a new malware called Latrodectus that has been distributed as part of email phishing campaigns...
admin
April 8, 2024
The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering...
admin
April 8, 2024
A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads...
admin
April 8, 2024
Google has filed a lawsuit against two app developers for engaging in an "international online consumer investment fraud scheme"...
admin
April 6, 2024
Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into...
admin
April 5, 2024
New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two...
admin
April 5, 2024
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the...
admin
April 5, 2024
Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan.
The starting point of...
admin
April 5, 2024
Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by...
admin
April 5, 2024
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti...
admin
April 4, 2024
A suspected Vietnamese-origin threat actor has been observed targeting victims in several Asian and Southeast Asian countries...
admin
April 4, 2024
An updated version of an information-stealing malware called Rhadamanthys is being used in phishing campaigns targeting the...
admin
April 4, 2024
Operational Technology (OT) refers to the hardware and software used to change, monitor, or control the enterprise's physical...
admin
April 4, 2024
New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct...
admin
April 4, 2024
Ivanti has released security updates to address four security flaws impacting Connect Secure and Policy Secure Gateways...