New Mac Malware Trick Users By Posing as Legitimate macOS Tool
Chinese cybersecurity researcher has discovered a new strain of malware that spreads via "poisoned" search-engine results. The malware dubbed ‘OSX.ZuRu’...
Chinese cybersecurity researcher has discovered a new strain of malware that spreads via "poisoned" search-engine results. The malware dubbed ‘OSX.ZuRu’...
The Russian Embassy in Washington demanded an explanation from the United States about the cyber attacks that were committed on...
On September 21, Microsoft's security team announced that it has discovered a huge operation that delivers phishing services to cybercrime...
What do cyberthreats, Kubernetes and donuts have in common – except that all three end in “ts”, that is? All...
Microsoft uncovered a large-scale phishing-as-a-service operation, dubbed BulletProofLink, that enabled threat actors to easily carry out malicious campaigns. Microsoft researchers...
Minnesota-based farming supply cooperative Crystal Valley was hit by a ransomware attack, it is the second attack against the agriculture...
CVE-2021-40847 flaw in Netgear SOHO routers could be exploited by a remote attacker to execute arbitrary code as root. Security...
CISA, FBI, and the NSA warned today of an escalation of the attacks of the Conti ransomware gang targeting US...
A critical issue, tracked as CVE-2021-36260, affects more than 70 Hikvision device models and can allow attackers to take over...
Malwarebytes has reason to believe that the MSHTML vulnerability listed under CVE-2021-40444 is being used to target Russian entities. The...
In a detailed post on Github, security researcher Watchful_IP describes how he found that the majority of the recent camera...
VMware is urging users of vCenter server to patch no fewer than 19 problems affecting its products. These updates fix...
It’s not every day you receive a big money offer from someone claiming to sit in political asylum, but here...
Another day, another example of how the data sharing choices we make can come back to haunt us. The Guardian...
Sergey Ivanov, Director of Product Strategy at T1 Group, said that pirated files downloaded by users via torrent trackers may...
US-based web host and domain registrar Epik has confirmed an “unauthorized intrusion” in its systems, a week after members of...
While Hackers allegedly violated the protocol and seized $12.7 million in Bitcoin, pNetwork thus became the newest victim of the...
Yandex, the Russian technology and search engine powerhouse, disclosed last week that it had been hit by one of the...
The Federal Trade Commission on 15th September authorized a policy statement reminding makers of health applications and linked devices that...
Researchers found multiple flaws in widely used network management products from Nagios that pose serious risk to organizations. Researchers from...
VMware addressed a critical arbitrary file upload vulnerability that affects the default configuration of vCenter Server 6.7 and 7.0 deployments....
Security researchers disclosed a new zero-day flaw in Apple’s macOS Finder that can allow attackers to run arbitrary commands on...
Russia-linked cyber espionage group Turla made the headlines again, the APT has employed a new backdoor in a recent wave...
When it comes to picking a new device for your child, it’s often difficult to know where to start. Whether...