Transparent Tribe Hackers Distribute CapraRAT via Trojanized Messaging Apps
A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber espionage...
A suspected Pakistan-aligned advanced persistent threat (APT) group known as Transparent Tribe has been linked to an ongoing cyber espionage...
An older version of Shein's Android application suffered from a bug that periodically captured and transmitted clipboard contents to a...
The massive breach at LastPass was the result of one of its engineers failing to update Plex on their home...
Europol has announced that law enforcement in Germany and Ukraine targeted two individuals believed to be core members of the...
The Federal Trade Commission (FTC) has proposed to ban the online counseling service BetterHelp from sharing its customers’ sensitive mental...
The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach...
A new phishing campaign targets organizations in Eastern European countries with the Remcos RAT malware with aid from an old...
The Sandbox blockchain game is warnings its community that a security incident caused some users to receive fraudulent emails impersonating...
An ongoing hacking campaign called 'Hiatus' targets DrayTek Vigor router models 2960 and 3900 to steal data from victims and...
A proof-of-concept for CVE-2023-21716, a critical vulnerability in Microsoft Word that allows remote code execution, has been published over the...
Organizations rapidly adopt the cloud as they rely heavily on data and technology to drive their businesses. These organizations utilize...
Deep fakes are expected to become a more prominent attack vector. Here's how to identify them. What are Deep Fakes?#...
A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America, Europe, and North America...
Law enforcement authorities from Germany and Ukraine have targeted suspected core members of a cybercrime group that has been behind...
Malicious actors can take advantage of "insufficient" forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive data, a new...
A group of researchers has revealed what it says is a vulnerability in a specific implementation of CRYSTALS-Kyber, one of...
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access...
The Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen in a...
A new ATM malware strain dubbed FiXS has been observed targeting Mexican banks since the start of February 2023. "The...
This past January, a SaaS Security Posture Management (SSPM) company named Wing Security (Wing) made waves with the launch of...
The APT27 hacking group, aka "Iron Tiger," has prepared a new Linux version of its SysUpdate custom remote access malware,...
Microsoft is investigating an ongoing outage blocking Exchange Online customers worldwide from accessing their mailboxes or sending/receiving emails. Affected users...
GitHub has announced that its secret scanning alerts service is now generally available to all public repositories and can be...
Cisco has addressed a critical security vulnerability found in the Web UI of multiple IP Phone models that unauthenticated and...