SUSE Linux Kernel Multiple Vulnerabilities
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A new type of malware called UULoader is being used by threat actors to deliver next-stage payloads like Gh0st RAT...
Cybersecurity researchers have uncovered a surge in malware infections stemming from malvertising campaigns distributing a loader called FakeBat. "These attacks...
A newly patched security flaw in Microsoft Windows was exploited as a zero-day by Lazarus Group, a prolific state-sponsored actor...
Malicious actors are using a cloud attack tool named Xeon Sender to conduct SMS phishing and spam campaigns on a...
Cybersecurity researchers have discovered new infrastructure linked to a financially motivated threat actor known as FIN7. The two clusters of...
A large percentage of Google's own Pixel devices shipped globally since September 2017 included dormant software that could be used...
OpenAI on Friday said it banned a set of accounts linked to what it said was an Iranian covert influence...
A large-scale extortion campaign has compromised various organizations by taking advantage of publicly accessible environment variable files (.env) that contain...
National Public Data, a US background check company, suffered a data breach in April 2024 that could have exposed sensitive...
Web distributed denial of service (DDoS) attacks rose by 265% in the first half of 2024 compared to H2 2023,...
Microsoft has announced it is mandating multi-factor authentication (MFA) for all Azure sign-ins.Customers can select from multiple MFA options through...
A large-scale extortion campaign has compromised various organizations by taking advantage of publicly accessible environment variable files (.env) that contain...
A 27-year-old Russian national has been sentenced to over three years in prison for peddling financial information, login credentials, and...
Chinese-speaking users are the target of an ongoing campaign that distributes malware known as ValleyRAT. "ValleyRAT is a multi-stage malware...
Cybersecurity researchers have shed light on a sophisticated information stealer campaign that impersonates legitimate brands to distribute malware like DanaBot...
SaaS applications have become indispensable for organizations aiming to enhance productivity and streamline operations. However, the convenience and efficiency these...
A large percentage of Google's own Pixel devices shipped globally since September 2017 included dormant software that could be used...
Cybersecurity researchers have uncovered new stealer malware that's designed to specifically target Apple macOS systems. Dubbed Banshee Stealer, it's offered...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
A vulnerability was identified in F5 BIG-IP, a remote attacker could exploit this vulnerability to trigger sensitive information disclosure on the targeted system. Note:No patch...
Microsoft fixed nine zero-day vulnerabilities on its August Patch Tuesday yesterday, including six that have been exploited in the wild.These...