451 PyPI packages install Chrome extensions to steal crypto
Over 450 malicious PyPI python packages were found installing malicious browser extensions to hijack cryptocurrency transactions made through browser-based crypto...
Over 450 malicious PyPI python packages were found installing malicious browser extensions to hijack cryptocurrency transactions made through browser-based crypto...
Hackers conducting a new financially motivated campaign are using a variant of the Xortist commodity ransomware named 'MortalKombat,' together with...
Apple has released emergency security updates to address a new zero-day vulnerability used in attacks to hack iPhones, iPads, and...
A new stealthy malware named 'Beep' was discovered last week, featuring many features to evade analysis and detection by security...
Microsoft has reminded admins that Exchange Server 2013 is reaching its extended end-of-support (EOS) date in 60 days, on April...
A new set of 16 malicious NPM packages are pretending to be internet speed testers but are, in reality, coinminers...
The APT37 threat group uses a new evasive 'M2RAT' malware and steganography to target individuals for intelligence collection. APT37, also...
Community Health Systems (CHS) says it was impacted by a recent wave of attacks targeting a zero-day vulnerability in Fortra’s...
Google announced on Tuesday that it's officially rolling out Privacy Sandbox on Android in beta to eligible mobile devices running...
Microsoft on Tuesday released security updates to address 75 flaws spanning its product portfolio, three of which have come under...
One thing is clear. The "business value" of data continues to grow, making it an organization's primary piece of intellectual...
Microsoft on Monday attributed a China-based cyber espionage actor to a set of attacks targeting diplomatic entities in South America....
Malicious actors have published more than 451 unique Python packages on the official Python Package Index (PyPI) repository in an...
The threat actors behind the black hat redirect malware campaign have scaled up their campaign to use more than 70...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
After the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a decryptor for affected victims to recover from ESXiArgs...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added three flaws to its Known Exploited Vulnerabilities (KEV) catalog,...
Suspected Russian threat actors have been targeting Eastern European users in the crypto industry with fake job opportunities...
A previously unknown threat actor has been targeting companies in the U.S. and Germany with bespoke malware designed to...
An unknown threat actor created malicious game modes for the Dota 2 multiplayer online battle arena (MOBA) video game...
The advanced persistent threat (APT) actor known as Tonto Team carried out an unsuccessful attack on cybersecurity company Group-IB...
Apple on Monday rolled out security updates for iOS, iPadOS, macOS, and Safari to address a zero-day flaw that it...
There have been a number of reports of attacks on industrial control systems (ICS) in the past few years. Looking...
Web infrastructure company Cloudflare on Monday disclosed that it thwarted a record-breaking distributed denial-of-service (DDoS) attack that peaked at over...