Dinodasrat Malware Targets Linux Servers In Espionage Campaign
Security researchers have observed Red Hat and Ubuntu systems being attacked by a Linux version of the DinodasRAT (also known...
Security researchers have observed Red Hat and Ubuntu systems being attacked by a Linux version of the DinodasRAT (also known...
Security researchers found a new version of the Vultur banking trojan for Android that includes more advanced remote control capabilities...
AT&T has finally confirmed it is impacted by a data breach affecting 73 million current and former customers after initially...
Today, Red Hat warned users to immediately stop using systems running Fedora development and experimental versions because of a backdoor found...
An infostealer malware campaign has collected millions of logins from users of various gaming websites, including players that use cheats,...
If your job involves keeping applications or data secure, you know how important penetration testing can be in identifying potential...
A vulnerability in the wall command of the util-linux package that is part of the Linux operating system could allow an unprivileged...
Image: Midjourney American retailer Hot Topic disclosed that two waves of credential stuffing attacks in November exposed affected customers' personal...
The Python Package Index (PyPI) has temporarily suspended user registration and the creation of new projects to deal with an...
Cisco has shared a set of recommendations for customers to mitigate password-spraying attacks that have been targeting Remote Access VPN...
CISA warns that attackers are now exploiting a Microsoft SharePoint code injection vulnerability that can be chained with a critical privilege...
Google fixed seven security vulnerabilities in the Chrome web browser on Tuesday, including two zero-days exploited during the Pwn2Own Vancouver...
Google's Threat Analysis Group (TAG) and Google subsidiary Mandiant said they've observed a significant increase in the number of zero-day...
The INC Ransom extortion gang is threatening to publish three terabytes of data allegedly stolen after breaching the National Health Service...
Ransomware is changing, fast. The past three months have seen dramatic developments among the ransomware ecosystem to include the takedown...
A new phishing-as-a-service (PhaaS) named ‘Darcula’ uses 20,000 domains to spoof brands and steal credentials from Android and iPhone users...
Over 15 free VPN apps on Google Play were found using a malicious software development kit that turned Android devices...
Cybercriminals are selling custom Raspberry Pi software called 'GEOBOX' on Telegram, which allows inexperienced hackers to convert the mini-computers into...
Image: Midjourney The Finnish Police confirmed on Tuesday that the APT31 hacking group linked to the Chinese Ministry of State...
A new variant of "TheMoon" malware botnet has been spotted infecting thousands of outdated small office and home office (SOHO)...
A new hacking campaign dubbed "ShadowRay" targets an unpatched vulnerability in Ray, a popular open-source AI framework, to hijack computing...
The German national cybersecurity authority warned on Tuesday that it found at least 17,000 Microsoft Exchange servers in Germany exposed...
Academic researchers developed ZenHammer, the first variant of the Rowhammer DRAM attack that works on CPUs based on recent AMD Zen microarchitecture that map...
Cybercriminals have been increasingly using a new phishing-as-a-service (PhaaS) platform named 'Tycoon 2FA' to target Microsoft 365 and Gmail accounts and...