FjordPhantom Android Malware Targets Banks With Virtualization
Security researchers have discovered a new Android malware, known as FjordPhantom, notable for its elusive nature and covert spreading tactics.The...
Security researchers have discovered a new Android malware, known as FjordPhantom, notable for its elusive nature and covert spreading tactics.The...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...
Threat actors from the Democratic People's Republic of Korea (DPRK) are increasingly targeting the cryptocurrency sector as a major revenue...
Google has revealed a new multilingual text vectorizer called RETVec (short for Resilient and Efficient Text Vectorizer) to help detect...
Google has revealed a new multilingual text vectorizer called RETVec (short for Resilient and Efficient Text Vectorizer) to help detect...
Threat actors from the Democratic People's Republic of Korea (DPRK) are increasingly targeting the cryptocurrency sector as a major revenue...
Wing Security recently announced that basic third-party risk assessment is now available as a free product. But it raises the...
A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud analytics and business intelligence platform...
Welcome to a world where Generative AI revolutionizes the field of cybersecurity. Generative AI refers to the use of artificial...
A CACTUS ransomware campaign has been observed exploiting recently disclosed security flaws in a cloud analytics and business intelligence platform...
Wing Security recently announced that basic third-party risk assessment is now available as a free product. But it raises the...
Welcome to a world where Generative AI revolutionizes the field of cybersecurity. Generative AI refers to the use of artificial...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass,...
The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that has been put to use...
The U.S. Treasury Department on Wednesday imposed sanctions against Sinbad, a virtual currency mixer that has been put to use...
Discount store chain Dollar Tree was impacted by a third-party data breach affecting 1,977,486 people after the hack of service...
Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger security restriction bypass,...
Google has released an update for Chrome to fix several new vulnerabilities, including one rated high severity that is currently...
Security experts have urged ownCloud customers to mitigate a critical zero-day vulnerability in its “graphapi” app announced last week, after...
Security researchers have uncovered a new design flaw in the Google Workspace Domain-Wide Delegation feature. Named “DeleFriend” by Hunters’ Team Axon, the vulnerability could...
Threat actors have been observed exploiting a critical vulnerability, CVE-2023-46604, in Apache systems. Over the past few weeks, Fortiguard Labs identified multiple...
Threat intelligence-sharing platform VirusTotal has unveiled new research showing how AI can be used by cyber defenders to enhance malware...
A worrying 17% of the UK’s small and medium-sized businesses (SMBs) can’t always spot the tell-tale signs of online fraud...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...