Ongoing Medusa Campaign Targeting Android Device Users
There are reports of an ongoing Medusa malware campaign targeting Android device users. The Medusa banking trojan, first discovered in...
There are reports of an ongoing Medusa malware campaign targeting Android device users. The Medusa banking trojan, first discovered in...
CISA and Partners Release Guidance for Exploring Memory Safety in Critical Open Source Projects Today, CISA, in partnership with the...
A newly disclosed critical security flaw impacting Progress Software MOVEit Transfer is already seeing exploitation attempts in the wild shortly...
Multiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new credit card web...
Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to the headphones...
Threat actors with suspected ties to China and North Korea have been linked to ransomware and data encryption attacks targeting...
The heightened regulatory and legal pressure on software-producing organizations to secure their supply chains and ensure the integrity of their...
INC Ransom Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Cybersecurity researchers have discovered an updated version of an Android banking trojan called Medusa that has been used to target...
Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese company acquired...
BianLian Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
A popular cryptocurrency portfolio management specialist has revealed a major cyber-attack which impacted 1590 of its customers’ crypto wallets.CoinStats describes...
Tens of thousands of Levi’s customers may have had their accounts compromised after a credential stuffing attack, the clothing giant...
New fraud campaigns have been discovered involving the Medusa (TangleBot) banking Trojan, which had evaded detection for nearly a year. An...
Security researchers have uncovered a significant increase in dark web activity involving stolen identity information from Singapore citizens. In an advisory...
Vulnerability researchers at Google’s Project Zero have introduced Naptime, a new framework that will be used to enable a large...
Nearly half (44%) of organizations have experienced a cloud data breach, with 14% reporting having had an incident in the...
CISA Releases Twenty Industrial Control Systems Advisories CISA released twenty Industrial Control Systems (ICS) advisories on June 13, 2024. These...
CISA Adds Two Known Exploited Vulnerabilities to Catalog CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
Phone Scammers Impersonating CISA Employees Impersonation scams are on the rise and often use the names and titles of government...
CISA and Partners Release Guidance for Modern Approaches to Network Access Security Today, CISA, in partnership with the Federal Bureau...
CISA Releases One Industrial Control Systems Advisory CISA released one Industrial Control Systems (ICS) advisory on June 18, 2024. These...