How to prevent Microsoft OneNote files from infecting Windows with malware
The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach...
The seemingly innocuous Microsoft OneNote file has become a popular file format used by hackers to spread malware and breach...
The Sandbox blockchain game is warnings its community that a security incident caused some users to receive fraudulent emails impersonating...
An ongoing hacking campaign called 'Hiatus' targets DrayTek Vigor router models 2960 and 3900 to steal data from victims and...
A proof-of-concept for CVE-2023-21716, a critical vulnerability in Microsoft Word that allows remote code execution, has been published over the...
Organizations rapidly adopt the cloud as they rely heavily on data and technology to drive their businesses. These organizations utilize...
A new phishing campaign targets organizations in Eastern European countries with the Remcos RAT malware with aid from an old...
Deep fakes are expected to become a more prominent attack vector. Here's how to identify them. What are Deep Fakes?#...
A never-before-seen complex malware is targeting business-grade routers to covertly spy on victims in Latin America, Europe, and North America...
Law enforcement authorities from Germany and Ukraine have targeted suspected core members of a cybercrime group that has been behind...
Malicious actors can take advantage of "insufficient" forensic visibility into Google Cloud Platform (GCP) to exfiltrate sensitive data, a new...
A group of researchers has revealed what it says is a vulnerability in a specific implementation of CRYSTALS-Kyber, one of...
The Trusted Platform Module (TPM) 2.0 specification is affected by two buffer overflow vulnerabilities that could allow attackers to access...
The Play ransomware gang has begun to leak data from the City of Oakland, California, that was stolen in a...
A new ATM malware strain dubbed FiXS has been observed targeting Mexican banks since the start of February 2023. "The...
This past January, a SaaS Security Posture Management (SSPM) company named Wing Security (Wing) made waves with the launch of...
The APT27 hacking group, aka "Iron Tiger," has prepared a new Linux version of its SysUpdate custom remote access malware,...
Microsoft is investigating an ongoing outage blocking Exchange Online customers worldwide from accessing their mailboxes or sending/receiving emails. Affected users...
Cisco has addressed a critical security vulnerability found in the Web UI of multiple IP Phone models that unauthenticated and...
GitHub has announced that its secret scanning alerts service is now generally available to all public repositories and can be...
Aruba Networks published a security advisory to inform customers about six critical-severity vulnerabilities impacting multiple versions of ArubaOS, its proprietary...
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released 'Decider,' an open-source tool that helps defenders and security analysts...
The Biden-Harris administration today released its national cybersecurity strategy that focuses on shifting the burden of defending the country's cyberspace...
British retailer WH Smith has suffered a data breach that exposed information belonging to current and former employees. The company operates...
An ongoing phishing campaign is pretending to be Trezor data breach notifications attempting to steal a target's cryptocurrency wallet and...