Russian Hackers Target Victims Using Commercial Spyware Exploits
Russian hackers are exploiting commercial spyware vulnerabilities to target specific victims, marking a significant cyber threat. In a world-first move,...
Russian hackers are exploiting commercial spyware vulnerabilities to target specific victims, marking a significant cyber threat. In a world-first move,...
Cybersecurity researchers have unearthed new network infrastructure set up by Iranian threat actors to support activities linked to the recent...
Cybersecurity researchers have uncovered a novel malware campaign that leverages Google Sheets as a command-and-control (C2) mechanism. The activity, detected...
Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through malware that disguises itself...
The most dangerous vulnerability you've never heard of. In the world of cybersecurity, vulnerabilities are discovered so often, and at...
Threat actors are actively exploiting a now-patched, critical security flaw impacting the Atlassian Confluence Data Center and Confluence Server to...
Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the npm registry,...
A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security measures in the face of...
Chinese-speaking users are the target of a "highly organized and sophisticated attack" campaign that is likely leveraging phishing emails to...
Multiple vulnerabilities were identified in Ubuntu Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
Multiple vulnerabilities were identified in RedHat Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in SUSE Linux Kernel. A remote attacker could exploit some of these vulnerabilities to trigger denial...
An unpatched CCTV vulnerability is being targeted to spread a variant of Mirai malware, raising significant security concerns. An unpatched...
BlackByte, a ransomware group connected to the notorious Conti group, is now exploiting VMware ESXi vulnerabilities to compromise systems and...
In recent months, the rise of pig butchering scams has highlighted alarming trends in online fraud, as scammers adapt their...
A recent analysis highlights a surge in attacks linked to North Korean hackers, focusing on the npm ecosystem to compromise...
A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver a variety of...
Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google Chrome browsers to...
A years-old high-severity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zero-day to rope them...
U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and...
Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute adversary-in-the-middle (AitM) attacks. AitM enables attackers to...
Discover how the Qilin malware has been stealthily stealing credentials from Google Chrome users, posing significant security risks. The emergence...
YouTube has introduced a new AI tool to assist users in recovering hacked accounts, enhancing security measures for greater protection....
Liverpool fans have emerged as the top victims of ticket scams in the Premier League for the 2023/24 season, losing...