Chinese Hackers Target Taiwanese Telecom Firms
The Insikt Group, the intelligence research department of the US network security consulting firm Recorded Future, published a report on...
The Insikt Group, the intelligence research department of the US network security consulting firm Recorded Future, published a report on...
A sophisticated campaign aimed at big multinational oil and gas firms has been running for more than a year, spreading...
Amid operations sending malicious documentation to work-seekers, the renowned group Lazarus advanced persistent threat (APT) has been identified. In this...
Following a Phoenix CryptoLocker ransomware attack in March, CNA Financial Corporation, a leading US-based insurance firm, is notifying clients of...
Just another "Won't Fix" Windows Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to...
With the global increase in JSON Web Token (JWT) usage, the attack surface has also increased significantly. Having said that,...
Mint Mobile discloses a data breach, an unauthorized attacker gained access to subscribers’ account information and ported phone numbers. Mint...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
Iran’s railroad system was hit by a cyberattack, hackers posted fake messages about delays or cancellations of the trains on...
Summary: Pexip Infinity 22.x through 24.x before 24.2 has Improper Input Validation for call setup. An unauthenticated remote attacker can...
Summary: Directory traversal in the Media File Organizer (aka media-file-organizer) plugin 1.0.1 for WordPress lets an attacker get access to...
Summary: The WP Fluent Forms plugin < 3.6.67 for WordPress is vulnerable to Cross-Site Request Forgery leading to stored Cross-Site...
Summary: An integer overflow vulnerability exists in the DICOM parse_dicom_meta_info functionality of Accusoft ImageGear 19.9. A specially crafted malformed file...
Summary: A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A...
Concern over online security has risen significantly in recent times. According to research published by Trulioo, consumers around the world...
Phishing scammers are pretending to be customers contact live-chat assistance agents with fake issues, making them open infected files, says...
Cybersecurity researchers from Nord Security have unearthed a new set of Trojan-type malware that has exploited over three million Windows...
According to research, email is indeed the most preferred medium of communication by almost 86 percent of professionals. Whilst the...
Researchers stated that fraudulent crypto mining applications available for download on Google Play have scammed more than 93,400 people so...
NExfil is an OSINT tool written in python for finding profiles by username. The provided usernames are checked on over...
Bastions are a cluster of machines used as the unique entry point by operational teams (such as sysadmins, developers, database...
Threat actors are conducting a spam campaign aimed at infecting Kaseya customers, posing as legitimate VSA security updates Kaseya is...
Summary: An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-005. Hashing is mishandled for certain retrieval of circuit data....
Summary: An issue was discovered in Tor before 0.4.6.5, aka TROVE-2021-006. The v3 onion service descriptor parsing allows out-of-bounds memory...