Lazarus hackers drop new RAT malware using 2-year-old Log4j bug
The notorious North Korean hacking group known as Lazarus continues to exploit CVE-2021-44228, aka "Log4Shell," this time to deploy three...
The notorious North Korean hacking group known as Lazarus continues to exploit CVE-2021-44228, aka "Log4Shell," this time to deploy three...
A critical severity vulnerability in a WordPress plugin with more than 90,000 installs can let attackers gain remote code execution...
Cold storage and logistics giant Americold has confirmed that over 129,000 employees and their dependents had their personal information stolen...
Toyota Financial Services (TFS) is warning customers it suffered a data breach, stating that sensitive personal and financial data was...
Valve has reportedly fixed an HTML injection flaw in CS2 that was heavily abused today to inject images into games...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
The notorious North Korea-linked threat actor known as the Lazarus Group has been attributed to a new global campaign that...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
Organizations are still exposed to critical vulnerabilities in Log4j, two years after a maximum severity bug was found in the...
Interpol has repeated warnings that human traffickers are fueling an online fraud epidemic in South East Asia and beyond, after...
The EU reached a provisional deal on the AI Act on December 8, 2023, following record-breaking 36-hour-long ‘trilogue’ negotiations between...
Europol has issued a new warning regarding an emerging trend in organized crime involving the use of Bluetooth trackers. Originally designed...
The threat actor known as Lazarus Group has been observed targeting the Log4Shell vulnerability (CVE-2021-44228) in a new series of...
One of the most prolific ransomware-as-a-service (RaaS) groups operating today has suffered online disruption which intelligence experts have attributed to...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
The notorious North Korea-linked threat actor known as the Lazarus Group has been attributed to a new global campaign that...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...
In an increasingly digital world, no organization is spared from cyber threats. Yet, not every organization has the luxury of...
A collection of security flaws in the firmware implementation of 5G mobile network modems from major chipset vendors such as...
Cybersecurity researchers have discovered 18 malicious loan apps for Android on the Google Play Store that have been collectively downloaded...