Chinese Hackers Using Never-Before-Seen Tactics for Critical Infrastructure Attacks
The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed to be active in the wild since...
The newly discovered Chinese nation-state actor known as Volt Typhoon has been observed to be active in the wild since...
Image: iammarcowild A trojanized installer for the popular Super Mario 3: Mario Forever game for Windows has been infecting unsuspecting players with multiple...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Today, CISA ordered federal agencies to patch recently patched security vulnerabilities exploited as zero-days to deploy Triangulation spyware on iPhones...
U.S. law enforcement today seized the clear web domain of the notorious BreachForums (aka Breached) hacking forum three months after...
Cybersecurity solutions company Fortinet has updated its zero-trust access solution FortiNAC to address a critical-severity vulnerability that attackers could leverage...
PBI Research Services (PBI) has suffered a data breach with three clients disclosing that the data for 4.75 million people...
It was a relatively quiet week regarding ransomware news, with the BlackCat ransomware gang extorting Reddit and the ongoing MOVEit...
Grafana has released security fixes for multiple versions of its application, addressing a vulnerability that enables attackers to bypass authentication...
LastPass password manager users have been experiencing significant login issues starting early May after being prompted to reset their authenticator...
American Airlines and Southwest Airlines, two of the largest airlines in the world, disclosed data breaches on Friday caused by the...
Image: Ax Sharma The University of Manchester finally confirmed that attackers behind a cyberattack disclosed in early June had stolen...
A U.K. citizen who took part in the massive July 2020 hack of Twitter has been sentenced to five years...
The U.S. Cybersecurity and Infrastructure Security Agency has added a batch of six flaws to its Known Exploited Vulnerabilities (KEV)...
The case for browser fingerprinting: personalizing user experience, improving fraud detection, and optimizing login security Have you ever heard of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A threat actor known as Muddled Libra is targeting the business process outsourcing (BPO) industry with persistent attacks that leverage...
A new strain of JavaScript dropper has been observed delivering next-stage payloads like Bumblebee and IcedID. Cybersecurity firm Deep Instinct...
The U.S. National Security Agency (NSA) on Thursday released guidance to help organizations detect and prevent infections of a Unified...
The case for browser fingerprinting: personalizing user experience, improving fraud detection, and optimizing login security Have you ever heard of...
Internet-facing Linux systems and Internet of Things (IoT) devices are being targeted as part of a new campaign designed to...
The U.S. National Security Agency (NSA) released today guidance on how to defend against BlackLotus UEFI bootkit malware attacks. BlackLotus...
Security researchers have found a simple way to deliver malware to an organization with Microsoft Teams, despite restrictions in the...