This Malware Turned Thousands of Hacked Windows and macOS PCs into Proxy Servers
Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them...
Threat actors are leveraging access to malware-infected Windows and macOS machines to deliver a proxy server application and use them...
The threat actors behind the HiatusRAT malware have returned from their hiatus with a new wave of reconnaissance and targeting...
From a user's perspective, OAuth works like magic. In just a few keystrokes, you can whisk through the account creation...
Image: Midjourney The Cuba ransomware gang was observed in attacks targeting critical infrastructure organizations in the United States and IT...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info phoenixcontact -- wp_6xxx_series In PHOENIX CONTACTs WP 6xxx series web panels...
Serde, a popular Rust (de)serialization project, has decided to ship its serde_derive macro as a precompiled binary. The move has generated a fair...
The China-aligned APT (advanced persistent threat) group known as 'Bronze Starlight' was seen targeting the Southeast Asian gambling industry with...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info phoenixcontact -- wp_6xxx_series In PHOENIX CONTACTs WP 6xxx series web panels...
Threat actors are using Android Package (APK) files with unknown or unsupported compression methods to elude malware analysis. That's according...
Networking hardware company Juniper Networks has released an "out-of-cycle" security update to address multiple flaws in the J-Web component of...
Cybersecurity researchers have detailed an updated version of an advanced fingerprinting and redirection toolkit called WoofLocker that's engineered to conduct...
A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can...
While there was quite a bit of ransomware news this week, the highlighted story was the release of Jon DiMaggio's...
An international law enforcement operation led by Interpol has led to the arrest of 14 suspected cybercriminals in an operation...
Security researchers have discovered a new financially motivated cyber-threat campaign designed to make money from cryptomining and proxyjacking while staying...
Security researchers have spotted a new Chinese espionage campaign targeting Asian gambling companies, which they suspect is the work of...
The UK’s much-anticipated summit on AI safety will reportedly be held in November, with cybersecurity experts welcoming the government’s focus...
A collaborative effort led by Interpol, known as Africa Cyber Surge II, has yielded significant results in combating cybercrime across...
A significant phishing campaign employing QR codes has recently come to light, with a major US-based energy company as one...
A recent cybersecurity study has brought to light a concerning vulnerability crisis affecting web applications. CyCognito’s semi-annual State of External Exposure...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info phoenixcontact -- wp_6xxx_series In PHOENIX CONTACTs WP 6xxx series web panels...
A new "mass-spreading" social engineering campaign is targeting users of the Zimbra Collaboration email server with an aim to collect...
A coordinated law enforcement operation across 25 African countries has led to the arrest of 14 suspected cybercriminals, INTERPOL announced...
While IT security managers in companies and public administrations rely on the concept of Zero Trust, APTS (Advanced Persistent Threats)...