Exclusive: Resecurity discovered 0-day vulnerability in TP-Link Wi-Fi 6 devices
Resecurity researchers found a zero-day vulnerability in the TP-Link enterprise device with model number TL-XVR1800L. Resecurity, a Los Angeles-based cybersecurity...
Resecurity researchers found a zero-day vulnerability in the TP-Link enterprise device with model number TL-XVR1800L. Resecurity, a Los Angeles-based cybersecurity...
A threat actor, tracked as APT C-23, is using new powerful Android spyware in attacks aimed at targets in the...
Security researchers discovered a new Linux RAT, tracked as CronRAT, that hides in scheduled cron jobs to avoid detection. Security...
Google’s Cybersecurity Action Team has released a Threat Horizons report focusing on cloud security. It’s taken some criticism for being...
The Cybersecurity and Infrastructure Security Agency (CISA) has released two actionable Capacity Enhancement Guides (CEGs) to help users and organizations...
Recently disclosed data breach impacted several of its brands, including Domain Factory, Heart Internet, Host Europe, Media Temple, tsoHost and...
The idea of connecting your entire home to the internet was once a mind-blowing concept. Thanks to smart devices, that...
An Iranian threat actor is stealing Google and Instagram credentials of Farsi-speaking targets by exploiting a Microsoft MSHTML bug. Researchers...
The UK’s top cybercops are urging owners of small online shops to “protect their customers and profits” by guarding against...
The Federal Bureau of Investigation (FBI) warns of cybercriminals targeting online shoppers during the holiday season. The FBI warns of...
VMware addressed arbitrary file read and server-side request forgery (SSRF) vulnerabilities in its vCenter Server product. VMware this week addressed...
Gamers are a hot target for scammers, especially in the run up to Christmas. Major games are released throughout the...
Researchers deployed multiple instances of vulnerable systems and found that 80% of the 320 honeypots were compromised within 24 hours. Researchers...
Sometimes the ways in which malicious code gets in the hands of cybercriminals is frustrating for those in the industry,...
Facebook recently announced it would give up on its facial recognition system. Facebook, or Meta, was using software to automatically...
As Microsoft’s Head of Deception, Ross Bevington is responsible for setting up and maintaining honeypots that look like legitimate systems and...
Apple has filed suit to ban the Israeli surveillance firm NSO Group and parent company Q Cyber Technologies from using...
A vulnerability in Oracle VM VirtualBox could be potentially exploited to compromise the hypervisor and trigger a denial-of-service (DoS) condition....
Continuing trends In recent years, we have observed various trends in the changing threat landscape for industrial enterprises, most of...
For a second consecutive year, the time for Kaspersky to make its predictions for the healthcare sector comes amid the...
We no longer rely on the Internet just for entertainment or chatting with friends. Global connectivity underpins the most basic...
First of all, we are going to analyze the forecasts we made at the end of 2020 and see how...
Vxers are already attempting to use the proof-of-concept exploit code targeting a new Microsoft Windows Installer zero-day publicly disclosed on...
Researchers spotted dozens of games on Huawei’s AppGallery catalog containing the Android.Cynos.7.origin trojan. Researchers from Dr. Web AV discovered 190 games on...