Malicious Apps Disguised as Banks and Government Agencies Targeting Indian Android Users
Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install...
Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install...
The Rhysida ransomware gang has claimed responsibility for a cyberattack on the British Library in October, which has caused a...
The Lumma information-stealing malware is now using an interesting tactic to evade detection by security software - the measuring of...
What happens when an employee at your organization forgets their password? If your workplace is like many, a forgotten password...
The Kinsing malware operator is actively exploiting the CVE-2023-46604 critical vulnerability in the Apache ActiveMQ open-source message broker to compromise...
A recently discovered worm that researchers call LittleDrifter has been spreading over USB drives infecting systems in multiple countries as...
A new Phobos ransomware variant frames the popular VX-Underground malware-sharing collective, indicating the group is behind attacks using the encryptor....
The Tor Project has explained its recent decision to remove multiple network relays that represented a threat to the safety and...
The former chief operating officer of a cybersecurity company has pleaded guilty to hacking two hospitals, part of the Gwinnett...
The Canadian government says two of its contractors have been hacked, exposing sensitive information belonging to an undisclosed number of...
The UK’s National Cyber Security Centre (NCSC) has revealed details of its first RFC for standards body the Internet Engineering...
Ukrainian security researchers have revealed a major new Russian cyber-espionage campaign which they claim may have been designed to harvest...
A new version of the infamous information stealer Lumma has emerged with a sophisticated anti-sandbox technique. Operating under the Malware-as-a-Service (MaaS)...
A former NHS secretary has been fined by the data protection regulator after illegally accessing the medical records of over...
The US Cybersecurity and Infrastructure Security Agency (CISA) has released a Mitigation Guide specifically tailored for the Healthcare and Public...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformThe 1E-Exchange-URLResponseTime instruction that is part of the Network product...
Bitcoin wallets created between 2011 and 2015 are susceptible to a new kind of exploit called Randstorm that makes it...
In this article, we will provide a brief overview of Silverfort's platform, the first (and currently only) unified identity protection...
Today's security leaders must manage a constantly evolving attack surface and a dynamic threat environment due to interconnected devices, cloud...
Phishing campaigns delivering malware families such as DarkGate and PikaBot are following the same tactics previously used in attacks leveraging...
The stealer malware known as LummaC2 (aka Lumma Stealer) now features a new anti-sandbox technique that leverages the mathematical principle...
Threat actors are targeting the education, government and business services sectors with a remote access trojan called NetSupport RAT. "The...
An Indian hack-for-hire group targeted the U.S., China, Myanmar, Pakistan, Kuwait, and other countries as part of a wide-ranging espionage,...
A team of academic researchers from universities in California and Massachusetts demonstrated that it’s possible under certain conditions for passive network...