SpyNote Android Spyware Strikes Financial Institutions
The Android spyware known as SpyNote has been targeting financial institutions since late 2022 while expanding its capabilities to carry...
The Android spyware known as SpyNote has been targeting financial institutions since late 2022 while expanding its capabilities to carry...
The UK’s Ministry of Defence (MoD) has launched its Secure by Design initiative, which is to transform how cybersecurity is...
Cybersecurity researchers have uncovered crucial insights into the tactics, techniques and procedures (TTPs) employed by the threat actor APT31 (also known...
Website of Israel's largest oil refinery operator, BAZAN Group is inaccessible from most parts of the world as threat actors claim to have...
Google has published its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing problem in...
Hackers are actively exploiting a 'BleedingPipe' remote code execution vulnerability in Minecraft mods to run malicious commands on servers and...
Hackers are using a fake Android app named 'SafeChat' to infect devices with spyware malware that steals call logs, texts,...
Canon is warning users of home, office, and large format inkjet printers that their Wi-Fi connection settings stored in the...
Threat actors are actively targeting exposed instances of SSH and Redis Redis open-source data store with a peer-to-peer self-replicating worm...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infooliva_expertise -- oliva_expertise_eks Improper Neutralization of Special Elements used in an SQL...
The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible Redis servers and...
Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research organizations in China...
More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home office...
Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small and mid-size businesses...
Increasing cyber threats and attacks have made protecting organizational data a paramount concern for businesses of all sizes. A group...
An ongoing cyber attack campaign has set its sights on Korean-speaking individuals by employing U.S. Military-themed document lures to trick...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a "novel persistent backdoor" called SUBMARINE deployed...
The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC) module that's...
Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users into downloading a downloader malware called...
A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather...
Ivanti has disclosed yet another security flaw impacting Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core, that it said...
Apple has announced plans to require developers to submit reasons to use certain APIs in their apps starting later this...
Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could be exploited by threat actors...
Two new Android malware families named 'CherryBlos' and 'FakeTrade' were discovered on Google Play, aiming to steal cryptocurrency credentials and...