Tell Me Your Secrets Without Telling Me Your Secrets
The title of this article probably sounds like the caption to a meme. Instead, this is an actual problem GitGuardian's...
The title of this article probably sounds like the caption to a meme. Instead, this is an actual problem GitGuardian's...
Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab. "The malware itself...
Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at risk of supply chain attacks....
The popular Zero2Automated malware analysis and reverse-engineering course has a Black Friday 2023 through Cyber Monday sale, where you can...
North Korean hackers have been blamed for a sophisticated supply chain campaign in which they compromised legitimate multimedia software to...
The British Library has revealed that HR data was stolen and leaked in a recent ransomware breach.The state-run institution, one...
US authorities have announced the seizure of millions of dollars’ worth of cryptocurrency linked to a romance and investment fraud...
The University of Manchester’s CISO has highlighted how the institution approached remediation and recovery following the damaging cyber-incident it experienced...
Check Point’s Threat Intel Blockchain system has revealed a new scam, shedding light on the persistent threat of Rug Pulls –...
Software supply chain attacks conducted by North Korean hackers have skyrocketed over the past few years, according to UK and...
The Akamai Security Incident Response Team (SIRT) has detected increased activity targeting a rarely used TCP port across its global...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocheckpoint -- endpoint_securityLocal attacker can escalate privileges on affected installations of Check...
A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to deliver malware capable of harvesting sensitive...
Modern security tools continue to improve in their ability to defend organizations' networks and endpoints against cybercriminals. But the bad...
A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application developed...
An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality to rope routers and video...
A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate application developed...
Blender has confirmed that recent site outages have been caused by ongoing DDoS (distributed denial of service) attacks that started...
Black Friday 2023 is here, and great deals are live in computer security, software, online courses, system admin services, antivirus,...
The Lumma information-stealer malware (aka 'LummaC2') is promoting a new feature that allegedly allows cybercriminals to restore expired Google cookies,...
Security researchers bypassed Windows Hello fingerprint authentication on Dell Inspiron, Lenovo ThinkPad, and Microsoft Surface Pro X laptops in attacks...
A new Mirai-based malware botnet named 'InfectedSlurs' has been exploiting two zero-day remote code execution (RCE) vulnerabilities to infect routers...
Microsoft says a North Korean hacking group has breached Taiwanese multimedia software company CyberLink and trojanized one of its installers...
The Kansas Judicial Branch has published an update on a cybersecurity incident it suffered last month, confirming that hackers stole...