New BLUFFS attack lets attackers hijack Bluetooth connections
Researchers at Eurecom have developed six new attacks collectively named 'BLUFFS' that can break the secrecy of Bluetooth sessions, allowing...
Researchers at Eurecom have developed six new attacks collectively named 'BLUFFS' that can break the secrecy of Bluetooth sessions, allowing...
Hackers are exploiting a critical ownCloud vulnerability tracked as CVE-2023-49103 that exposes admin passwords, mail server credentials, and license keys...
Google has fixed the sixth Chrome zero-day vulnerability this year in an emergency security update released today to counter ongoing...
Decentralized exchange KyberSwap has become the latest crypto firm to lose millions to digital thieves, after reporting a highly sophisticated...
A prolific threat actor has been spotted on the dark web selling what they claim to be sensitive information stolen...
The SysJoker malware has been linked to targeted attacks by a Hamas-affiliated threat actor during the Israel-Hamas conflict. The unattributed multi-platform...
The UK’s National Cyber Security Centre (NCSC) has published what it claims to be the world’s first globally agreed guidelines...
US consumers were deluged with an estimated two billion spam and scam calls last month, according to new data from...
The US Cybersecurity and Infrastructure Security Agency (CISA) has urged Congress to reauthorize a critically important program designed to protect...
Police in Ukraine have arrested five individuals including the suspected ringleader of a prolific ransomware affiliate believed to have made...
Fidelity National Financial (FNF) has disclosed a cybersecurity incident that prompted the company to take down certain systems.The company made...
Cybercriminals are so far reluctant to use generative AI to launch attacks, according to new research by Sophos.Examining four prominent...
Threat actors undertaking identity fraud have been using deepfakes ten times more in 2023 than in 2022, according to digital...
Security researchers have uncovered the continuation and expansion of an Android mobile banking Trojan campaign targeting major Iranian banks. Initially discovered...
Ardent Health Services and its affiliated entities discovered a cybersecurity incident on the morning of November 23 2023, confirming it to...
The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN have been observed "mixing and matching"...
A new study has demonstrated that it's possible for passive network attackers to obtain private RSA host keys from a...
If forecasters are right, over the course of today, consumers will spend $13.7 billion. Just about every click, sale, and...
Account credentials, a popular initial access vector, have become a valuable commodity in cybercrime. As a result, a single set...
Identity and Access Management (IAM) systems are a staple to ensure only authorized individuals or entities have access to specific...
Cybersecurity researchers have discovered a case of "forced authentication" that could be exploited to leak a Windows user's NT LAN...
A coordinated law enforcement operation has led to the arrest of key individuals in Ukraine who are alleged to be...
As cloud technology evolves, so does the challenge of securing sensitive data. In a world where data duplication and sprawl...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoadobe -- after_effectsAdobe After Effects version 24.0.2 (and earlier) and 23.6 (and...