APT31 Implants Target Industrial Organizations
Cybersecurity researchers have uncovered crucial insights into the tactics, techniques and procedures (TTPs) employed by the threat actor APT31 (also known...
Cybersecurity researchers have uncovered crucial insights into the tactics, techniques and procedures (TTPs) employed by the threat actor APT31 (also known...
Website of Israel's largest oil refinery operator, BAZAN Group is inaccessible from most parts of the world as threat actors claim to have...
Hackers are using a fake Android app named 'SafeChat' to infect devices with spyware malware that steals call logs, texts,...
Canon is warning users of home, office, and large format inkjet printers that their Wi-Fi connection settings stored in the...
Threat actors are actively targeting exposed instances of SSH and Redis Redis open-source data store with a peer-to-peer self-replicating worm...
Google has published its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing problem in...
Hackers are actively exploiting a 'BleedingPipe' remote code execution vulnerability in Minecraft mods to run malicious commands on servers and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infooliva_expertise -- oliva_expertise_eks Improper Neutralization of Special Elements used in an SQL...
The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible Redis servers and...
Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research organizations in China...
Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small and mid-size businesses...
More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home office...
Increasing cyber threats and attacks have made protecting organizational data a paramount concern for businesses of all sizes. A group...
An ongoing cyber attack campaign has set its sights on Korean-speaking individuals by employing U.S. Military-themed document lures to trick...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a "novel persistent backdoor" called SUBMARINE deployed...
The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC) module that's...
Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could be exploited by threat actors...
Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users into downloading a downloader malware called...
A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather...
Ivanti has disclosed yet another security flaw impacting Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core, that it said...
Apple has announced plans to require developers to submit reasons to use certain APIs in their apps starting later this...
Two new Android malware families named 'CherryBlos' and 'FakeTrade' were discovered on Google Play, aiming to steal cryptocurrency credentials and...
CISA warned today of the significant breach risks linked to insecure direct object reference (IDOR) vulnerabilities impacting web applications in...
The Hawaiʻi Community College has admitted that it paid a ransom to ransomware actors to prevent the leaking of stolen...