Russian National Sanctioned For Virtual Currency Money Laundering
The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned a Russian national for her involvement...
The US Department of the Treasury’s Office of Foreign Assets Control (OFAC) has sanctioned a Russian national for her involvement...
The SpyNote Trojan, camouflaged as a mod for the game Roblox, has been observed targeting Android users. This mobile malware can...
The US, Japan and South Korea have established a high-level consultative body designed to counter North Korea’s cyber activities.A key...
Cloud native development practices are creating dangerous new security blind spots for organizations in the US, UK, France and Germany,...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
Israeli higher education and tech sectors have been targeted as part of a series of destructive cyber attacks that commenced...
An updated version of an information stealer malware known as Jupyter has resurfaced with "simple yet impactful changes" that aim...
QNAP has released security updates to address two critical security flaws impacting its operating system that could result in arbitrary...
Cybersecurity researchers have shed light on a new dropper-as-a-service (DaaS) for Android called SecuriDropper that bypasses new security restrictions imposed...
The U.S. Department of the Treasury imposed sanctions against a Russian woman for taking part in the laundering of virtual...
Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit that leverages its Calendar service to host...
Google is rolling out a new banner to highlight the "Independent security review" badge in the Play Store's Data safety...
A proxy botnet called 'Socks5Systemz' has been infecting computers worldwide via the 'PrivateLoader' and 'Amadey' malware loaders, currently counting 10,000...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info projectworlds_pvt._limited -- online_art_gallery Online Art Gallery v1.0 is vulnerable to multiple...
Discord will switch to temporary file links for all users by the end of the year to block attackers from...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info projectworlds_pvt._limited -- online_art_gallery Online Art Gallery v1.0 is vulnerable to multiple...
An advanced strain of malware masquerading as a cryptocurrency miner has managed to fly the radar for over five years,...
Google is rolling out an "Independent security review" badge in the Play Store's Data safety section for Android apps that...
Identity and authentication management provider Okta on Friday disclosed that the recent support case management system breach affected 134 of...
AIT fraud: what you need to know The rise in Artificial Inflation of Traffic (AIT) is leaving many businesses out...
Next steps in migrating to post-quantum cryptography In 2020, the NCSC published a white paper on https://www.ncsc.gov.uk/whitepaper/next-steps-preparing-for-post-quantum-cryptography" target="_self">Preparing for Quantum-Safe...
A former Dutch cybersecurity professional was sentenced to four years in prison after being found guilty of hacking and blackmailing...
Okta says attackers who breached its customer support system last month gained access to files belonging to 134 customers, five...
Over the past couple of months, ransomware attacks have been escalating as new operations launch, old ones return, and existing...