WhatsApp fixed critical and high severy vulnerabilities
WhatsApp has addressed two severe Remote Code Execution vulnerabilities affecting the mobile version of the software. WhatsApp has published three security...
WhatsApp has addressed two severe Remote Code Execution vulnerabilities affecting the mobile version of the software. WhatsApp has published three security...
The recently discovered Erbium information-stealer is being distributed as fake cracks and cheats for popular video games. Threat actors behind...
Researchers are tracking multiple self-proclaimed hacktivist groups working in support of Russia, and identified 3 groups linked to the GRU....
Executive Summary NullMixer is a dropper leading to an infection chain of a wide variety of malware families. NullMixer spreads...
The Ukrainian military intelligence warns that Russia is planning to escalate cyberattacks targeting Ukraine and Western allies. The Main Directorate...
China-linked cyberespionage group TA413 exploits employ a never-before-undetected backdoor called LOWZERO in attacks aimed at Tibetan entities. A China-linked cyberespionage group, tracked...
A previously undetected hacking group, tracked as Metador, has been targeting telecommunications, internet services providers (ISPs), and universities for about...
Ransomware operators switch to new extortion tactics by using the Exmatter malware and adding new data corruption functionality. The data...
Threat actors target GitHub users to steal credentials and two-factor authentication (2FA) codes by impersonating the CircleCI DevOps platform. GitHub...
OpIran: Anonymous launched Operation Iran against Teheran due to the ongoing crackdown on dissent after Mahsa Amini’s death. Anonymous launched...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
The Internet Systems Consortium (ISC) fixed six remotely exploitable vulnerabilities in the BIND DNS software. The Internet Systems Consortium (ISC)...
The cyber department of Ukraine ‘s Security Service (SSU) dismantled a gang that stole accounts of about 30 million individuals....
The City of London Police this week announced the arrest of a 17-year-old teenager on suspicion of hacking. Is he...
Most mass malicious mailing campaigns are very primitive and hardly diverse, with the content limited to several sentences offering the...
Sophos warns that a critical code injection security vulnerability in its Firewall product is actively exploited in the wild. Sophos...
Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect...
The popular collective Anonymous claims to have hacked the website of the Russian Ministry of Defense and leaked data of...
CISA added a security flaw in Zoho ManageEngine, tracked as CVE-2022-35405, to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and...
Sansec researchers warn of a surge in hacking attempts targeting a critical Magento 2 vulnerability tracked as CVE-2022-24086. Sansec researchers...
Australian telecoms company Optus disclosed a data breach, threat actors gained access to former and current customers. Optus, one of...
A critical vulnerability in Oracle Cloud Infrastructure (OCI) could be exploited to access the virtual disks of other Oracle customers....
Explore key insights on how ransomware as a service (RaaS) operators work and how to prevent ransomware attacks. If you...
More than 350,000 open source projects can be potentially affected by a 15-Year-Old unpatched Python vulnerability More than 350,000 open...