Flipper Zero Bluetooth spam attacks ported to new Android app
Recent Flipper Zero Bluetooth spam attacks have now been ported to an Android app, allowing a much larger number of...
Recent Flipper Zero Bluetooth spam attacks have now been ported to an Android app, allowing a much larger number of...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info projectworlds_pvt._limited -- online_art_gallery Online Art Gallery v1.0 is vulnerable to multiple...
The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has been attributed as behind an Android...
Meta on Monday announced plans to offer an ad-free option to access Facebook and Instagram for users in the European...
In the ever-evolving cybersecurity landscape, the game-changers are those who adapt and innovate swiftly. Pen test solutions not only supercharge...
A new malvertising campaign has been observed capitalizing on a compromised website to promote spurious versions of PyCharm on Google...
Atlassian has warned of a critical security flaw in Confluence Data Center and Server that could result in "significant data...
Cybersecurity researchers have uncovered a new set of malicious packages published to the NuGet package manager using a lesser-known method...
Canada on Monday announced a ban on the use of apps from Tencent and Kaspersky on government mobile devices, citing...
A new malware wiper known as BiBi-Linux is being used to destroy data in attacks targeting Linux systems belonging to...
The Toronto Public Library (TPL) is warning that many of its online services are offline after suffering a cyberattack over the...
Huawei, Honor, and Vivo smartphones and tablets are displaying strange 'Security threat' alerts urging the deletion of the Google app,...
The U.S. Federal Trade Commission (FTC) has amended the Safeguards Rules, mandating that all non-banking financial institutions report data breach...
Public exploit code is now available for the critical Cisco IOS XE vulnerability tracked as CVE-2023-20198 that was leveraged as...
A security researcher has published a proof-of-concept (PoC) exploit for Wyze Cam v3 devices that opens a reverse shell and...
Hackers have stolen $4.4 million in cryptocurrency on October 25th using private keys and passphrases stored in stolen LastPass databases,...
The U.S. Securities and Exchange Commission (SEC) today charged SolarWinds with defrauding investors by allegedly concealing cybersecurity defense issues before...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info projectworlds_pvt._limited -- online_art_gallery Online Art Gallery v1.0 is vulnerable to multiple...
A pro-Hamas hacktivist group has been observed using a new Linux-based wiper malware dubbed BiBi-Linux Wiper, targeting Israeli entities amidst...
Most, if not all malvertising incidents result from a threat actor either injecting code within an existing ad, or intentionally...
Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in "unintended access" to...
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand, handling millions of daily file...
A new ongoing campaign dubbed EleKtra-Leak has set its eyes on exposed Amazon Web Service (AWS) identity and access management...
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such as...