Atlassian Confluence Vulnerability Exploited in Crypto Mining Campaigns
Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to...
Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to...
Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry,...
A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of...
Chinese-speaking users are the target of a "highly organized and sophisticated attack" campaign that is likely leveraging phishing emails to...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
An unpatched CCTV vulnerability is being targeted to spread a variant of Mirai malware, raising significant security concerns. An unpatched...
BlackByte, a ransomware group connected to the notorious Conti group, is now exploiting VMware ESXi vulnerabilities to compromise systems and...
In recent months, the rise of pig butchering scams has highlighted alarming trends in online fraud, as scammers adapt their...
A recent analysis highlights a surge in attacks linked to North Korean hackers, focusing on the npm ecosystem to compromise...
A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver a variety of...
Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google Chrome browsers to...
U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and...
A years-old high-severity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zero-day to rope them...
Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute adversary-in-the-middle (AitM) attacks. AitM enables attackers to...
Discover how the Qilin malware has been stealthily stealing credentials from Google Chrome users, posing significant security risks. The emergence...
YouTube has introduced a new AI tool to assist users in recovering hacked accounts, enhancing security measures for greater protection....
Liverpool fans have emerged as the top victims of ticket scams in the Premier League for the 2023/24 season, losing...
The NSA has introduced a vital guide to help organizations defend against Living Off the Land (LOTL) cyber attacks. The...
A newly uncovered group, Greasy Opal, has been identified as a facilitator of cyber-attacks by providing CAPTCHA-solving services to threat...
The Chinese Velvet Ant cyber espionage group is leveraging a Cisco zero-day vulnerability to deploy custom malware, raising significant security...
Georgia Tech is facing serious allegations of cybersecurity violations, prompting a lawsuit from the US government. This case highlights the...
The FBI's flawed data handling practices raise serious security concerns, as revealed by a recent audit from the US Department...