admin
March 18, 2024
The Russia-linked threat actor known as APT28 has been linked to multiple ongoing phishing campaigns that employ lure documents...
admin
March 18, 2024
WordPress users of miniOrange's Malware Scanner and Web Application Firewall plugins are being urged to delete them...
admin
March 16, 2024
Cybersecurity researchers have found a number of GitHub repositories offering cracked software that are used to deliver...
admin
March 16, 2024
A group of researchers has discovered a new data leakage attack impacting modern CPU architectures supporting speculative...
admin
March 15, 2024
Cybersecurity researchers have found that third-party plugins available for OpenAI ChatGPT could act as a new attack...
admin
March 15, 2024
Google on Thursday announced an enhanced version of Safe Browsing to provide real-time, privacy-preserving URL protection and...
admin
March 15, 2024
Chinese users looking for legitimate software such as Notepad++ and VNote on search engines like Baidu are...
admin
March 14, 2024
Details have been made public about a now-patched high-severity flaw in Kubernetes that could allow a malicious...
admin
March 14, 2024
A 34-year-old Russian-Canadian national has been sentenced to nearly four years in jail in Canada for his...
admin
March 14, 2024
Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires...
admin
March 14, 2024
The Russian-speaking cybercrime group called RedCurl is leveraging a legitimate Microsoft Windows component called the Program Compatibility Assistant (PCA)...
admin
March 14, 2024
The threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader...
admin
March 14, 2024
A DarkGate malware campaign observed in mid-January 2024 leveraged a recently patched security flaw in Microsoft Windows...
admin
March 14, 2024
Fortinet has warned of a critical security flaw impacting its FortiClientEMS software that could allow attackers to...
admin
March 13, 2024
One of the most common misconceptions in file upload cybersecurity is that certain tools are “enough” on...
admin
March 13, 2024
The threat actors behind the PixPirate Android banking trojan are leveraging a new trick to evade detection...
admin
March 13, 2024
Identities are the latest sweet spot for cybercriminals, now heavily targeting SaaS applications that are especially vulnerable...
admin
March 13, 2024
Google's Gemini large language model (LLM) is susceptible to security threats that could cause it to divulge system prompts,...
admin
March 13, 2024
A new phishing campaign has been observed delivering remote access trojans (RAT) such as VCURMS and STRRAT...
admin
March 13, 2024
Microsoft on Tuesday released its monthly security update, addressing 61 different security flaws spanning its software, including two critical...