Telegram App Flaw Exploited to Spread Malware Hidden in Videos
A zero-day security flaw in Telegram's mobile app for Android called EvilVideo made it possible for attackers to malicious files...
A zero-day security flaw in Telegram's mobile app for Android called EvilVideo made it possible for attackers to malicious files...
A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign designed to...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog,...
Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking...
A vulnerability has been identified in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's...
UK law enforcement agencies have infiltrated and taken down DigitallStress, the world’s most prolific underground marketplace offering distributed denial of...
Russia’s cyber activities in Ukraine have shifted away from strategic civilian targets towards pursuing tactical military objectives, according to a...
Prolific Chinese espionage group Daggerfly (aka Evasive Panda, Bronze Highland) has extensively updated its malware toolkit, increasing its abilities to...
Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking...
The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research institution in...
Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in...
The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice...
Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest...
Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its...
Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four years...
On 19 Jul 2024, CrowdStrike Falcon Sensor caused crashes on Windows hosts. Windows hosts running on cloud such as Azure,...
The Play ransomware group has introduced a Linux variant of its malware that specifically targets VMWare ESXi environments, according to...
Two Russian nationals have pleaded guilty to their participation in the notorious LockBit ransomware gang, the US Department of Justice...
Ransomware groups have become increasingly fragmented due to recent law enforcement action according to data comes from Europol’s latest Internet...
Cybercriminals are leveraging the ongoing mass global IT outage to launch phishing campaigns, according to reports.CrowdStrike Intelligence warned that threat...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the user A...
A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud serverless projects to orchestrate credential...
The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use...