5 API Vulnerabilities That Get Exploited by Criminals
Let’s give a look at API vulnerabilities by reading the API Security Top 10 published by the Open Web Application...
Let’s give a look at API vulnerabilities by reading the API Security Top 10 published by the Open Web Application...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A researcher revealed how to bypass some of the filters in Cisco Secure Email Gateway appliance and deliver malware using...
Researchers warn of threat actors employing a new Go-based malware dubbed Aurora Stealer in attacks in the wild. Aurora Stealer...
Two Estonian citizens were arrested in Tallinn for allegedly running a $575 million cryptocurrency fraud scheme. Two Estonian nationals were...
The Emotet malware is back and experts warn of a high-volume malspam campaign delivering payloads like IcedID and Bumblebee. Proofpoint...
A researcher published details and proof-of-concept (PoC) code for High-Severity macOS Sandbox escape vulnerability tracked as CVE-2022-26696. Researcher Wojciech Reguła...
Google won a lawsuit filed against two Russian nationals involved in the operations of the Glupteba botnet. This week, Google...
Researchers at Google Cloud identified 34 different hacked release versions of the Cobalt Strike tool in the wild. Cobalt Strike...
Experts from Cyble Research and Intelligence Labs (CRIL) discovered three new ransomware families: AXLocker, Octocrypt, and Alice Ransomware. Threat intelligence...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Proof-of-concept exploit code for two actively exploited Microsoft Exchange ProxyNotShell flaws released online. Proof-of-concept exploit code has been released online...
Microsoft warns that a threat actor, tracked as DEV-0569, is using Google Ads to distribute the recently discovered Royal ransomware....
Every year during Black Friday and Cyber Monday, crooks take advantage of the bad habits of users with fraudulent schema....
Cisco Talos spotted multiple updated versions of LodaRAT that were deployed alongside other malware families, including RedLine and Neshta. Researchers...
IT threat evolution in Q3Â 2022 IT threat evolution in Q3Â 2022. Non-mobile statistics IT threat evolution in Q3Â 2022. Mobile statistics These...
IT threat evolution in Q3Â 2022 IT threat evolution in Q3Â 2022. Non-mobile statistics IT threat evolution in Q3Â 2022. Mobile statistics These...
IT threat evolution in Q3Â 2022 IT threat evolution in Q3Â 2022. Non-mobile statistics IT threat evolution in Q3Â 2022. Mobile statistics Targeted...
We break down the cyberespionage activities of advanced persistent threat (APT) group Earth Preta, observed in large-scale attack deployments that...
Atlassian addressed this week two critical vulnerabilities impacting its Crowd and Bitbucket products. Atlassian announced the release of security updates...
Hive ransomware operators have extorted over $100 million in ransom payments from over 1,300 companies worldwide as of November 2022....
A threat actor tracked as WASP is behind an ongoing supply chain attack targeting Python developers with the WASP Stealer....
A China-based financially motivated group, tracked as Fangxiao, is behind a large-scale phishing campaign dating back as far as 2019. Researchers...
Public schools in two Michigan counties were forced to halt their activities, including the lessons, after a ransomware attack. Â ...