New ‘MetaStealer’ malware targets Intel-based macOS systems
A new information stealer malware named 'MetaStealer' has appeared in the wild, stealing a wide variety of sensitive information from...
A new information stealer malware named 'MetaStealer' has appeared in the wild, stealing a wide variety of sensitive information from...
Adobe has released security updates to patch a zero-day vulnerability in Acrobat and Reader tagged as exploited in attacks. Even...
A vulnerability was identified in Google Chrome. A remote attacker could exploit this vulnerability to trigger remote code execution on...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesBrowser Low Risk Windows High RiskElevation of Privilege Denial of Service...
Adobe has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesDetails (including CVE)Adobe Connect Medium RiskCross-site Scripting Remote Code Execution APSB23-33Adobe...
A vulnerability was identified in Mozilla Products, a remote attacker could exploit this vulnerability to trigger remote code execution on...
The US Cybersecurity and Infrastructure Security Agency (CISA) has given federal agencies less than a month to update their iOS,...
Security researchers have revealed a new cyber-espionage campaign in which a threat group compromised multiple computers used to run a...
A perfect storm of digitalization, geopolitical tension and organized crime is helping to drive financial and economic crime to new heights,...
A multi-stage malware attack has recently come to light, with Windows systems as its primary target, according to security researchers...
Targeting individual ransomware strains is confusing and even unhelpful in tackling this threat vector, according to a joint report from...
SlashNext, a cybersecurity company, has uncovered a concerning trend in the world of artificial intelligence (AI) chatbots. Referred to as...
MGM Resorts International, a well-known name in the world of hotels and casinos, has experienced a cybersecurity incident. According to a...
Google on Monday rolled out out-of-band security patches to address a critical security flaw in its Chrome web browser that...
A sophisticated phishing campaign is using a Microsoft Word document lure to distribute a trifecta of threats, namely Agent Tesla,...
A threat actor called Redfly has been linked to a compromise of a national grid located in an unnamed Asian...
A new information stealer malware called MetaStealer has set its sights on Apple macOS, making the latest in a growing...
SaaS applications are the backbone of modern businesses, constituting a staggering 70% of total software usage. Applications like Box, Google...
A new vulnerability disclosed in GitHub could have exposed thousands of repositories at risk of repojacking attacks, new findings show....
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocanonical_ltd. -- snapd_for_linuxUsing the TIOCLINUX ioctl request, a malicious snap could inject...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Ransomware and the cyber crime ecosystem Ransomware has been the biggest development in cyber crime since we published the NCSC’s...
Several malicious Telegram clones for Android on Google Play were installed over 60,000 times, infecting people with spyware that steals...
Image: Midjourney State-backed hacking groups have breached a U.S. aeronautical organization using exploits targeting critical Zoho ManageEngine and Fortinet vulnerabilities,...