Redfly Group Compromises National Power Grid
Security researchers have revealed a new cyber-espionage campaign in which a threat group compromised multiple computers used to run a...
Security researchers have revealed a new cyber-espionage campaign in which a threat group compromised multiple computers used to run a...
A perfect storm of digitalization, geopolitical tension and organized crime is helping to drive financial and economic crime to new heights,...
A multi-stage malware attack has recently come to light, with Windows systems as its primary target, according to security researchers...
Targeting individual ransomware strains is confusing and even unhelpful in tackling this threat vector, according to a joint report from...
SlashNext, a cybersecurity company, has uncovered a concerning trend in the world of artificial intelligence (AI) chatbots. Referred to as...
MGM Resorts International, a well-known name in the world of hotels and casinos, has experienced a cybersecurity incident. According to a...
Google on Monday rolled out out-of-band security patches to address a critical security flaw in its Chrome web browser that...
A sophisticated phishing campaign is using a Microsoft Word document lure to distribute a trifecta of threats, namely Agent Tesla,...
A threat actor called Redfly has been linked to a compromise of a national grid located in an unnamed Asian...
A new information stealer malware called MetaStealer has set its sights on Apple macOS, making the latest in a growing...
SaaS applications are the backbone of modern businesses, constituting a staggering 70% of total software usage. Applications like Box, Google...
A new vulnerability disclosed in GitHub could have exposed thousands of repositories at risk of repojacking attacks, new findings show....
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocanonical_ltd. -- snapd_for_linuxUsing the TIOCLINUX ioctl request, a malicious snap could inject...
Multiple vulnerabilities were identified in Apple Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Ransomware and the cyber crime ecosystem Ransomware has been the biggest development in cyber crime since we published the NCSC’s...
Several malicious Telegram clones for Android on Google Play were installed over 60,000 times, infecting people with spyware that steals...
Image: Midjourney State-backed hacking groups have breached a U.S. aeronautical organization using exploits targeting critical Zoho ManageEngine and Fortinet vulnerabilities,...
The Associated Press is warning of a data breach impacting AP Stylebook customers where the attackers used the stolen data...
Hackers use a massive network of fake and compromised Facebook accounts to send out millions of Messenger phishing messages to...
A nation-state threat actor known as 'Charming Kitten' (Phosphorus, TA453, APT35/42) has been observed deploying a previously unknown backdoor malware...
MGM Resorts International disclosed today that it is dealing with a cybersecurity issue that impacted some of its systems, including...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) ordered federal agencies today to patch security vulnerabilities abused as part of...
A new attack dubbed 'WiKI-Eve' can intercept the cleartext transmissions of smartphones connected to modern WiFi routers and deduce individual...
A vulnerability was identified in Google Chrome. A remote attacker could exploit this vulnerability to trigger remote code execution on...