Hackers Win $105,000 for Reporting Critical Security Flaws in Sonos One Speakers
Multiple security flaws uncovered in Sonos One wireless speakers could be potentially exploited to achieve information disclosure and remote code...
Multiple security flaws uncovered in Sonos One wireless speakers could be potentially exploited to achieve information disclosure and remote code...
In this day and age, vulnerabilities in software and systems pose a considerable danger to businesses, which is why it...
Cybersecurity researchers are warning about CAPTCHA-breaking services that are being offered for sale to bypass systems designed to distinguish legitimate...
A new open source remote access trojan (RAT) called DogeRAT targets Android users primarily located in India as part of...
Managed Care of North America (MCNA) Dental has published a data breach notification on its website, informing almost 9 million...
A database for the notorious RaidForums hacking forums has been leaked online, allowing threat actors and security researchers insight into...
The notorious North Korean state-backed hackers, known as the Lazarus Group, are now targeting vulnerable Windows Internet Information Services (IIS)...
Jimbos Protocol, an Arbitrum-based DeFi project, has suffered a flash loan attack that resulted in the loss of more than...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Researchers have discovered an inexpensive attack technique that could be leveraged to brute-force fingerprints on smartphones to bypass user authentication...
A crypter (alternatively spelled cryptor) malware dubbed AceCryptor has been used to pack numerous strains of malware since 2016. Slovak...
If you're a cybersecurity professional, you're likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP,...
Linux routers in Japan are the target of a new Golang remote access trojan (RAT) called GobRAT. "Initially, the attacker...
A new phishing technique called "file archiver in the browser" can be leveraged to "emulate" a file archiver software in...
The Python Package Index (PyPI) announced last week that every account that maintains a project on the official third-party software...
The Python Package Index (PyPI) has announced that it will require every account that manages a project on the platform...
A new 'File Archivers in the Browser' phishing kit abuses ZIP domains by displaying fake WinRAR or Windows File Explorer...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A team of researchers at Georgia Tech, the University of Michigan, and Ruhr University Bochum have developed a novel attack...
The QBot malware operation has started to abuse a DLL hijacking flaw in the Windows 10 WordPad program to infect...
CISA warned of a recently patched zero-day vulnerability exploited last week to hack into Barracuda Email Security Gateway (ESG) appliances....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity researchers for its ability to...
A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The hospital was in the process...