Android Keyboard Apps with 2 Million downloads can remotely hack your device
Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile...
Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile...
All statistics in this report are from the global cloud service Kaspersky Security Network (KSN), which receives information from components...
Redigo is a new Go-based malware employed in attacks against Redis servers affected by the CVE-2022-0543 vulnerability. Researchers from security firm...
A strong cybersecurity strategy isn’t just about choosing the right tools. Cybersecurity experts Greg Young and William Malik discuss three...
Data breaches can be devastating for organizations, these are 3 of the worst incidents that could have been prevented Data...
North Korea-linked ScarCruft group used a previously undocumented backdoor called Dolphin against targets in South Korea. ESET researchers discovered a previously undocumented backdoor called Dolphin...
LastPass disclosed a new security breach, threat actors had access to its cloud storage using information stolen in the August...
Google’s Threat Analysis Group (TAG) linked three exploitation frameworks to a Spanish surveillance spyware vendor named Variston. While tracking the...
Threat actors are exploiting interest in a popular TikTok challenge, dubbed Invisible Challenge, to trick users into downloading info-stealing malware....
An alleged China-linked cyberespionage group, tracked as UNC4191, used USB devices in attacks aimed at Philippines entities. Mandiant researchers spotted...
CyberNews experts discovered that ENC Security, a Netherlands software company, had been leaking critical business data since May 2021. Original...
Cyble observed Initial Access Brokers (IABs) offering access to enterprise networks compromised via a critical flaw in Fortinet products. Researchers at...
Data exposure from SaaS and cloud applications is an increasing risk factor facing businesses today. Discover how SASE capabilities can...
This three-part blog series explores the risks associated with CNC machines If you like the site, please consider joining the...
INTERPOL recently conducted operation African Surge to take down malicious infrastructure across the African continent and requested the help of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
CISA added a critical flaw impacting Oracle Fusion Middleware, tracked as CVE-2021-35587, to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity...
In today’s technological world, educating people about cybersecurity awareness is an absolute necessity. According to one report, 82% of data...
Irish data protection commission (DPC) fined Meta for not protecting Facebook’s users’ data from scraping. Meta has been fined €265 million...
Our last edition of privacy predictions focused on a few important trends where business and government interests intersect, with regulators...
The consumer threat landscape constantly changes. Although the main types of threats (phishing, scams, malware, etc.) remain the same, lures...
Massive growth in cloud use has increased the enterprise attack surface. Addressing the risks with specialized point solutions is unwieldy,...
ESET announced the discovery of a vulnerability impacting Acer laptops that can allow an attacker to deactivate UEFI Secure Boot....
Amazon Web Services (AWS) fixed a cross-tenant vulnerability that could have allowed attackers to gain unauthorized access to resources. Amazon...