Red Cross Issues Wartime Hacktivist Rules
The International Committee of the Red Cross (ICRC) has published a new set of rules urging hacktivists to abide by...
The International Committee of the Red Cross (ICRC) has published a new set of rules urging hacktivists to abide by...
Police in Northern Ireland have warned organizations in the province to be on their guard after issuing a new Crime...
Banking security firm ThreatFabric has found evidence that LightSpy, an iPhone spyware discovered in 2020, is more sophisticated than previously...
Human Security has exposed a significant monetization method employed by a sophisticated cyber-criminal operation. This operation involved the sale of...
A new EvilProxy phishing attack has taken aim at the job search platform Indeed while focusing on executives in various...
New findings have identified connections between an Android spyware called DragonEgg and another sophisticated modular iOS surveillanceware tool named LightSpy....
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoaccusoft -- imagegearAn out-of-bounds write vulnerability exists in the tiff_planar_adobe functionality of...
Microsoft has detailed a new campaign in which attackers unsuccessfully attempted to move laterally to a cloud environment through a...
Today, mid-sized companies and their CISOs are struggling to handle the growing threat of SaaS security with limited manpower and...
A new deceptive package hidden within the npm package registry has been uncovered deploying an open-source rootkit called r77, marking...
A new Linux security vulnerability dubbed Looney Tunables has been discovered in the GNU C library's ld.so dynamic loader that,...
A recently uncovered phishing campaign is targeting Microsoft 365 accounts of key executives in U.S.-based organizations by abusing open redirects from...
A new Linux vulnerability known as 'Looney Tunables' enables local attackers to gain root privileges by exploiting a buffer overflow...
Qualcomm is warning of three zero-day vulnerabilities in its GPU and Compute DSP drivers that hackers are actively exploiting in...
Google has released the October 2023 security updates for Android, addressing 54 unique vulnerabilities, including two known to be actively...
A set of critical vulnerabilities dubbed 'ShellTorch' in the open-source TorchServe AI model-serving tool impact tens of thousands of internet-exposed...
Google will introduce new sender guidelines in February to bolster email security against phishing and malware delivery by mandating bulk...
Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
Nearly one in five (19%) adults polled in a new survey from the UK’s privacy regulator think they’ve been monitored...
Over half (52%) of cybersecurity professionals are experiencing an increase in cyber-attacks compared to a year ago, according to new...
Security experts have warned of surging cyber risk in open source ecosystems, having detected three times more malicious packages in...
The Chartered Institute of Information Security (CIISec) has said it hopes to enrol at least 400 students on its CyberEPQ...
The EU’s Cyber Resilience Act (CRA) could be misused by governments for intelligence or surveillance purposes, a group of industry...
The Madagascar government likely used the Cytrox-developed Predator spyware to conduct political domestic surveillance ahead of the country’s presidential election,...