Chameleon Android Banking Trojan Targets Users Through Fake CRM App
Cybersecurity researchers have lifted the lid on a new technique adopted by threat actors behind the Chameleon Android banking trojan...
Cybersecurity researchers have lifted the lid on a new technique adopted by threat actors behind the Chameleon Android banking trojan...
Apple on Tuesday announced an update to its next-generation macOS version that makes it a little more difficult for users...
A Singaporean commodity firm has had a narrow escape after police managed to intervene to recover nearly all of the $42.3m...
IT systems used by about 40 French museums, including the Grand Palais, have been targeted by a ransomware attack.The French...
Most organizations pay ransoms when they find themselves victim of a ransomware attack, a new survey by Extrahop has highlighted....
Darktrace researchers have reported that 17.8 million phishing emails were detected between December 2023 and July 2024.The new report, published...
In the first half of 2024, the number of reported Common Vulnerabilities and Exposures (CVEs) has increased by 30% compared...
Singapore’s Ministry of Education has found that 13,000 students in the country had their data remotely wiped following a cyber-attack...
INTERPOL said it devised a "global stop-payment mechanism" that helped facilitate the largest-ever recovery of funds defrauded in a business...
Everyone loves the double-agent plot twist in a spy movie, but it's a different story when it comes to securing...
The North Korea-linked threat actor known as Moonstone Sleet has continued to push malicious npm packages to the JavaScript package...
Users in Russia have been the target of a previously undocumented Android post-compromise spyware called LianSpy since at least 2021....
Google has addressed a high-severity security flaw impacting the Android kernel that it has been actively exploited in the wild....
A new zero-day pre-authentication remote code execution vulnerability has been disclosed in the Apache OFBiz open-source enterprise resource planning (ERP)...
Updated Risk Level, Description, Source and Related Links.CVE-2018-0824 vulnerability is exploited in the wild. Microsoft COM for Windows contains a...
A vulnerability was identified in F5 BIG-IP, a remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system. Note:No patch...
Security researchers have uncovered a sophisticated supply chain attack campaign stemming from the compromise of an unnamed ISP.Volexity said the...
TikTok and parent company ByteDance are in the dock again after the Justice Department and FTC filed a civil lawsuit...
The White House and EC-Council have announced a $15m pledge to train over 50,000 students in critical cybersecurity skills.The scholarship...
Organizations utilizing Apache OFBiz have been warned to promptly address a critical vulnerability due to escalating exploitation attempts targeting a...
TikTok has agreed to permanently withdraw its ‘Lite Rewards’ program from the EU in response to EU Commission concerns about...
A new report from HP Wolf Security has highlighted the growing danger from threat actors targeting physical device supply chains...
Eighty-six percent of respondents have identified unknown organizational cyber-risks as a top concern, according to the Critical Start 2024 Cyber Risk...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...