#BHUSA: New Zero-Day Vulnerabilities Could Instantly Drain Crypto Wallets
Multiple zero-day vulnerabilities have been discovered in some of the most used cryptographic multi-party computation (MPC) protocols, putting consumers’ cryptocurrency...
Multiple zero-day vulnerabilities have been discovered in some of the most used cryptographic multi-party computation (MPC) protocols, putting consumers’ cryptocurrency...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoyunyecms -- yunyecmsSQL injection vulnerability in yunyecms 2.0.2 allows remote attackers to...
Hackers associated with China's Ministry of State Security (MSS) have been linked to attacks in 17 different countries in Asia,...
Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from...
Cyber-criminals continue to impersonate brands via well-crafted phishing websites. We previously covered attacks on both consumers and businesses via online searches...
Validate security continuously across your full stack with Pen Testing as a Service. In today's modern security operations center (SOC),...
The U.K. Electoral Commission on Tuesday disclosed a "complex" cyber attack on its systems that went undetected for over a...
Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency miners and other backdoors. Cloud security firm...
Tactical similarities have been unearthed between the double extortion ransomware group known as Rhysida and Vice Society, including in their...
Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tuesday updates for...
Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular...
Spotlight on shadow IT ‘Shadow IT’ (also known as ‘grey IT’) is the name given to those unknown IT assets...
To SOC or not to SOC ? So, you are implementing a large digital project, and have followed the GOV.UK...
The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in...
The Colorado Department of Higher Education (CDHE) discloses a massive data breach impacting students, past students, and teachers after suffering...
A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes...
The Google Play store was infiltrated by 43 Android applications with 2.5 million installs that secretly displayed advertisements while a...
The North Korean state-sponsored hacking group ScarCruft has been linked to a cyberattack on the IT infrastructure and email server...
The UK Electoral Commission disclosed a massive data breach exposing the personal information of anyone who registered to vote in...
Researchers from the Technical University of Berlin have developed a method to jailbreak the AMD-based infotainment systems used in all...
Hackers are increasingly abusing the legitimate Cloudflare Tunnels feature to create stealthy HTTPS connections from compromised devices, bypass firewalls, and...
Microsoft today released a defense-in-depth update for Microsoft Office that prevents exploitation of a remote code execution (RCE) vulnerability tracked...
Researchers have discovered a new and powerful transient execution attack called 'Inception' that can leak privileged secrets and data using...
Microsoft's Visual Studio Code (VS Code) code editor and development environment contains a flaw that allows malicious extensions to retrieve...