Undetected Android Trojan Expands Attack on Iranian Banks
Security researchers have uncovered the continuation and expansion of an Android mobile banking Trojan campaign targeting major Iranian banks. Initially discovered...
Security researchers have uncovered the continuation and expansion of an Android mobile banking Trojan campaign targeting major Iranian banks. Initially discovered...
Ardent Health Services and its affiliated entities discovered a cybersecurity incident on the morning of November 23 2023, confirming it to...
If forecasters are right, over the course of today, consumers will spend $13.7 billion. Just about every click, sale, and...
The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed "mixing and matching"...
A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host keys from a...
Account credentials, a popular initial access vector, have become a valuable commodity in cybercrime. As a result, a single set...
Identity and Access Management (IAM) systems are a staple to ensure only authorized individuals or entities have access to specific...
Cybersecurity researchers have discovered a case of "forced authentication" that could be exploited to leak a Windows user's NT LAN...
A coordinated law enforcement operation has led to the arrest of key individuals in Ukraine who are alleged to be...
As cloud technology evolves, so does the challenge of securing sensitive data. In a world where data duplication and sprawl...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...
Introducing the guidelines for secure AI Artificial Intelligence (AI) systems have the potential to bring many benefits to society. However,...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...
A new version of the multi-platform malware known as 'SysJoker' has been spotted, featuring a complete code rewrite in the...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocheckpoint -- endpoint_securityLocal attacker can escalate privileges on affected installations of Check...
The 'ClearFake' fake browser update campaign has expanded to macOS, targeting Apple computers with Atomic Stealer (AMOS) malware. The ClearFake...
General Electric is investigating claims that a threat actor breached the company's development environment in a cyberattack and leaked allegedly...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocheckpoint -- endpoint_securityLocal attacker can escalate privileges on affected installations of Check...
The maintainers of the open-source file-sharing software ownCloud have warned of three critical security flaws that could be exploited to...
An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in what's suspected to...
Open source file sharing software ownCloud is warning of three critical-severity security vulnerabilities, including one that can expose administrator passwords...
A cyberattack on CTS, a leading managed service provider (MSP) for law firms and other organizations in the UK legal...
The National Cyber Security Centre (NCSC) and Korea's National Intelligence Service (NIS) warn that the North Korean Lazarus hacking group...
House sales and purchases across the UK have been disrupted by a cyber-attack affecting multiple conveyancing firms.CTS, a legal sector...