PyTorch discloses malicious dependency chain compromise over holidays
PyTorch has identified a malicious dependency with the same name as the framework's 'torchtriton' library. This has led to a successful compromise via the dependency...
PyTorch has identified a malicious dependency with the same name as the framework's 'torchtriton' library. This has led to a successful compromise via the dependency...
The ALPHV ransomware operators have gotten creative with their extortion tactic and, in at least one case, created a replica...
The LockBit ransomware gang has released a free decryptor for the Hospital for Sick Children (SickKids), saying one of its...
An cyberattack hitting the Port of Lisbon Administration (APL), the third-largest port in Portugal, on Christmas day has been claimed...
A previously unknown Linux malware has been exploiting 30 vulnerabilities in multiple outdated WordPress plugins and themes to inject malicious JavaScript. According to...
The Canadian Copper Mountain Mining Corporation (CMMC) in British Columbia has announced that it was the target of a ransomware attack...
A group of imposters operating out of a Ukrainian call center defrauded thousands of victims while pretending to be IT security...
Netgear has fixed a high-severity vulnerability affecting multiple WiFi router models and advised customers to update their devices to the...
A bug in Google Home smart speaker allowed installing a backdoor account that could be used to control it remotely...
An anonymous Twitter user published yesterday a set of 10,000 API keys allegedly obtained from the 3Commas cryptocurrency trading platform....
Explore use cases and mitigation strategies to improve software supply chain security and reduce cyber risk. If you like the...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The Royal Ransomware gang claimed responsibility for a cyber attack against telecommunications company Intrado on Tuesday. While Intrado is yet...
Malware operators have been increasingly abusing the Google Ads platform to spread malware to unsuspecting users searching for popular software products....
Thousands of Citrix ADC and Gateway deployments remain vulnerable to two critical-severity security issues that the vendor fixed in recent months....
The Lake Charles Memorial Health System (LCMHS) is sending out notices of a data breach affecting thousands of people who...
BlueNoroff group is a financially motivated threat actor eager to profit from its cyberattack capabilities. We have published technical details...
Multiple BitKeep crypto wallet users reported that their wallets were emptied during Christmas after hackers triggered transactions that didn't require...
A team of researchers has developed an eavesdropping attack for Android devices that can, to various degrees, recognize the caller's...
BTC.com, one of the world's largest cryptocurrency mining pools, announced it was the victim of a cyberattack that resulted in...
A threat actor claims to be selling public and private data of 400 million Twitter users scraped in 2021 using...
Yohei Ishihara, IoT security evangelist at Trend Micro, discussed the challenges CISOs facing within organizations driving industrial IoT. If you...
Reports this week illustrate how threat actors consider Microsoft Exchange as a prime target for gaining initial access to corporate...
A new information-stealing malware named ‘RisePro’ is being distributed through fake cracks sites operated by the PrivateLoader pay-per-install (PPI) malware...