The threat actors behind the zero-day exploitation of a recently-patched security vulnerability in Microsoft Windows have ...
"The file names use Russian words related to the movement of troops in Ukraine as a lure," Cisco Talos researcher Guilherme ...
Google Patches Actively Exploited Chrome 0-Day — Google has addressed a high-severity security flaw in its Chrome browser for ...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE that has been ...
"wp-content/mu-plugins/custom-js-loader.php," which injects unwanted spam onto the infected website, likely with an intent to ...
Crocodilus is also capable of targeting cryptocurrency wallets with an overlay that, instead of serving a fake login page to ...
Applications hosted in AWS are still vulnerable to attacks like SSRF, where attackers trick a server into making requests on ...
Although AI will inevitably be used by attackers to improve the quality and enhance the pace of their attacks, there are proactive measures we can take to scale our defenses. Zero trust and smart ...
BlackLock's misconfigured leak site exposed internal commands, aiding Resecurity in uncovering 46 ransomware victims.
Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, ...
Twelve npm packages hijacked via compromised maintainer accounts to exfiltrate secrets using obfuscated scripts.
PJobRAT malware targeted Taiwanese Android users via fake chat apps from Jan 2023 to Oct 2024, enabling deep surveillance and ...