Predator Android Spyware: Researchers Uncover New Data Theft Capabilities
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli...
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli...
A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The hospital was in the process...
5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and...
Email protection and network security services provider Barracuda is warning users about a zero-day flaw that it said has been...
A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The hospital was in the process...
A new strain of malicious software that's engineered to penetrate and disrupt critical systems in industrial environments has been unearthed....
New cyber security training packages launched to manage supply chain risk The NCSC are delighted to launch https://www.ncsc.gov.uk/guidance/mapping-your-supply-chain#section_6" target="_self">two new...
A Brazilian hacking group has been targeting thirty Portuguese government and private financial institutions since 2021 in a malicious campaign...
A new ransomware operation named 'Buhti' uses the leaked code of the LockBit and Babuk ransomware families to target Windows...
Zyxel is warning customers of two critical-severity vulnerabilities in several of its firewall and VPN products that attackers could leverage without authentication....
Attackers are now using encrypted RPMSG attachments sent via compromised Microsoft 365 accounts to steal Microsoft credentials in targeted phishing attacks designed...
Mandiant security researchers have discovered a new malware called CosmicEnergy designed to disrupt industrial systems and linked to Russian cybersecurity...
D-Link has fixed two critical-severity vulnerabilities in its D-View 8 network management suite that could allow remote attackers to bypass...
Image: Bing Create Security researchers at Cisco Talos and the Citizen Lab have presented a new technical analysis of the...
Password security, like threat actor methods, continues to evolve. As computing power grows, previously best-practice passwords become increasingly vulnerable. Password...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
An unnamed government entity associated with the United Arab Emirates (U.A.E.) was targeted by a likely Iranian threat actor to...
Zyxel has released software updates to address two critical security flaws affecting select firewall and VPN products that could be...
A hospital with 2,000 employees in the E.U. deployed Cynet protections across its environment. The hospital was in the process...
A new botnet called Dark Frost has been observed launching distributed denial-of-service (DDoS) attacks against the gaming industry. "The Dark...
A Brazilian threat actor is targeting Portuguese financial institutions with information-stealing malware as part of a long-running campaign that commenced...
The threat actors behind the nascent Buhti ransomware have eschewed their custom payload in favor of leaked LockBit and Babuk...
In today's digital landscape, browser security has become an increasingly pressing issue, making it essential for organizations to be aware...
A stealthy China-based group managed to establish a persistent foothold into critical infrastructure organizations in the U.S. and Guam without...