Trojanized Tor browsers target Russians with crypto-stealing malware
A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users' cryptocurrency...
A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users' cryptocurrency...
Crown Resorts, Australia's largest gambling and entertainment company, has confirmed that it suffered a data breach after its GoAnywhere secure...
A new North Korean hacking group has been revealed to be targeting government organizations, academics, and think tanks in the...
Businesses rely on their end-users, but those same users often don't follow the best security practices. Without the right password...
Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard, allowing attackers to...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an attempt to...
Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited...
An advanced persistent threat (APT) group that has a track record of targeting India and Afghanistan has been linked to...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
U.S. President Joe Biden on Monday signed an executive order that restricts the use of commercial spyware by federal government...
A new phishing campaign has set its sights on European entities to distribute Remcos RAT and Formbook via a malware...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
Malicious actors are constantly adapting their tactics, techniques, and procedures (TTPs) to adapt to political, technological, and regulatory changes quickly....
A new info-stealing malware named MacStealer is targeting Mac users, stealing their credentials stored in the iCloud KeyChain and web browsers,...
New IcedID variants have been found without the usual online banking fraud functionality and instead focus on installing further malware...
Pwn2Own Vancouver 2023 has ended with contestants earning $1,035,000 and a Tesla Model 3 car for 27 zero-day (and several...
Twitter has taken down internal source code for its platform and tools that was leaked on GitHub for months. Now it's...
Microsoft is introducing a new Exchange Online security feature that will automatically start throttling and eventually block all emails sent...
Apple on Monday backported fixes for an actively exploited security flaw to older iPhone and iPad models. The issue, tracked...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Conor Brian Fitzpatrick, the 20-year-old founder and the administrator of the now-defunct BreachForums has been formally charged in the U.S....