ESET: new generation viruses will be able to imitate human behavior
Experts have named the main cyberthreats posed by the spread of artificial intelligence (AI) technologiesAnalysts predict the growth of the...
Experts have named the main cyberthreats posed by the spread of artificial intelligence (AI) technologiesAnalysts predict the growth of the...
Microsoft Threat Intelligence Centre (MSTIC) on Tuesday revealed a zero-day remote code execution exploit, being used to attack SolarWinds Serv-U...
The Joker mobile virus has made its entry back on Google Play with an increase in malicious Android apps that...
Researchers from Kaspersky have reported that hundreds of individuals from South East Asia, including Myanmar and the government of the...
According to a report released on Tuesday by the international Financial Stability Board (FSB), criminals targeted security flaws at financial...
Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files. With ventoy, you don't need to...
A collection of hardware s that aid in red team operations. This repository will help you during red team engagement....
SonicWall has issued an urgent security alert to warn customers of “an imminent ransomware campaing” targeting EOL equipment. SonicWall has...
Uptycs threat research team analyzed macOS malware threat landscape and discovered that Shlayer and Bundlore are the most predominant malware....
Google security experts revealed that Russia-linked APT group targeted LinkedIn users with Safari zero-day. Security researchers from Google Threat Analysis Group (TAG)...
LuminousMoth: Kaspersky uncovered an ongoing and large-scale APT campaign that targeted government entities in Southeast Asia, including Myanmar and the...
Summary: An issue was discovered in Echo ShareCare 8.15.5. The UnzipFile feature in Access/EligFeedParse_Sup/UnzipFile_Upd.cfm is susceptible to a command argument...
Summary: In onCreate of DeviceAdminAdd.java, there is a possible way to mislead a user to activate a device admin app...
Summary: An issue was discovered in Echo ShareCare 8.15.5. The file-upload feature in Access/DownloadFeed_Mnt/FileUpload_Upd.cfm is susceptible to an unrestricted upload...
Summary: Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform...
Summary: A command injection vulnerability in the sandcat plugin of Caldera 2.3.1 and earlier allows authenticated attackers to execute any...
It’s a turbulent time in the cryptomining realm, especially for malware authors. Some big attacks and a lot of publicity...
The list of July 2021 Patch Tuesday updates looks endless. 117 patches with no less than 42 CVEs assigned to...
Loreta and Mindaugas from Horsham, Sussex, were lured in a fake bonus offer from a fraudster who seemed to be...
The ongoing revival of malicious TrickBot malware has been revealed by cybersecurity researchers and shows that the Russia-based transnational cybercriminals...
China launched a destructive "cyber attack" on Nepal Telecom which resulted in Chinese hackers stealing the phone numbers of all...
The Security Service of Ukraine (SBU), Ukraine's top law enforcement agency, reported last week that it had discovered a large-scale...
Spain’s Ministry of the Interior has announced the arrest of 16 individuals connected to the Grandoreiro and Melcoz (also known...
APT actors are known for the frequently targeted nature of their attacks. Typically, they will handpick a set of targets...