Arid Viper Targeting Arabic Android Users with Spyware Disguised as Dating App
The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has been attributed as behind an Android...
The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has been attributed as behind an Android...
Meta on Monday announced plans to offer an ad-free option to access Facebook and Instagram for users in the European...
In the ever-evolving cybersecurity landscape, the game-changers are those who adapt and innovate swiftly. Pen test solutions not only supercharge...
A new malvertising campaign has been observed capitalizing on a compromised website to promote spurious versions of PyCharm on Google...
Atlassian has warned of a critical security flaw in Confluence Data Center and Server that could result in "significant data...
Cybersecurity researchers have uncovered a new set of malicious packages published to the NuGet package manager using a lesser-known method...
Canada on Monday announced a ban on the use of apps from Tencent and Kaspersky on government mobile devices, citing...
A new malware wiper known as BiBi-Linux is being used to destroy data in attacks targeting Linux systems belonging to...
The Toronto Public Library (TPL) is warning that many of its online services are offline after suffering a cyberattack over the...
Huawei, Honor, and Vivo smartphones and tablets are displaying strange 'Security threat' alerts urging the deletion of the Google app,...
Hackers have stolen $4.4 million in cryptocurrency on October 25th using private keys and passphrases stored in stolen LastPass databases,...
The U.S. Securities and Exchange Commission (SEC) today charged SolarWinds with defrauding investors by allegedly concealing cybersecurity defense issues before...
The U.S. Federal Trade Commission (FTC) has amended the Safeguards Rules, mandating that all non-banking financial institutions report data breach...
Public exploit code is now available for the critical Cisco IOS XE vulnerability tracked as CVE-2023-20198 that was leveraged as...
A security researcher has published a proof-of-concept (PoC) exploit for Wyze Cam v3 devices that opens a reverse shell and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info projectworlds_pvt._limited -- online_art_gallery Online Art Gallery v1.0 is vulnerable to multiple...
A pro-Hamas hacktivist group has been observed using a new Linux-based wiper malware dubbed BiBi-Linux Wiper, targeting Israeli entities amidst...
Most, if not all malvertising incidents result from a threat actor either injecting code within an existing ad, or intentionally...
Earlier this week, ServiceNow announced on its support site that misconfigurations within the platform could result in "unintended access" to...
Modern web app development relies on cloud infrastructure and containerization. These technologies scale on demand, handling millions of daily file...
A new ongoing campaign dubbed EleKtra-Leak has set its eyes on exposed Amazon Web Service (AWS) identity and access management...
A new cyber attack campaign has been observed using spurious MSIX Windows app package files for popular software such as...
Three unpatched high-severity security flaws have been disclosed in the NGINX Ingress controller for Kubernetes that could be weaponized by...
A new ransomware-as-a-service brand named Hunters International has emerged using code used by the Hive ransomware operation, leading to the...