Lookalike Telegram and WhatsApp Websites Distributing Cryptocurrency Stealing Malware
Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android...
Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android...
In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser...
Think of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes peeking out from...
A new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers and use...
The Federal Bureau of Investigation (FBI) revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of...
LockBit ransomware has claimed a cyber attack on Essendant, a wholesale distributer of office products after a "significant" and ongoing...
A threat actor is selling on a Russian-speaking hacking forum what they claim to be hundreds of gigabytes of data...
Security researchers have shared technical details for exploiting a critical Microsoft Outlook vulnerability for Windows (CVE-2023-23397) that allows hackers to remotely...
Last year, a U.S. federal agency's Microsoft Internet Information Services (IIS) web server was hacked by exploiting a critical .NET...
Nord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in the hopes...
Mozilla has announced the integration of Firefox Relay, an email protection system that helps users evade trackers and spammers, directly...
An advanced hacking group named 'Winter Vivern' targets European government organizations and telecommunication service providers to conduct espionage. The group's...
Nord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in the hopes...
CISA has added a critical vulnerability impacting Adobe ColdFusion versions 2021 and 2018 to its catalog of security bugs exploited...
Cybercriminals are abusing Adobe Acrobat Sign, an online document signing service, to distribute info-stealing malware to unsuspecting users. The service...
A convincing Twitter scam is targeting bank customers by abusing the quote-tweet feature, as observed by BleepingComputer. What makes this scam stand out is...
A decryption tool for a modified version of the Conti ransomware could help hundreds of victims recover their files for...
In an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows PC after a genuine...
Latitude Financial Services (Latitude) has disclosed a data breach after suffering a cyberattack, causing the company to shut down internal...
Project Zero, Google's zero-day bug-hunting team, discovered and reported 18 zero-day vulnerabilities in Samsung’s Exynos chipsets used in mobile devices,...
The BianLian ransomware group has shifted its focus from encrypting its victims' files to only exfiltrating data found on compromised...
Android malware 'FakeCalls' is circulating again in South Korea, imitating phone calls for over 20 financial organizations and attempting to...
Microsoft has released a script to make it easier to patch a BitLocker bypass security vulnerability in the Windows Recovery...
A suspected Chinese hacking group has been linked to a series of attacks on government organizations exploiting a Fortinet zero-day...