Fake WinRAR proof-of-concept exploit drops VenomRAT malware
A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect...
A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect...
The developers of Free Download Manager (FDM) have published a script to check if a Linux device was infected through...
The average annual cost of insider risk incidents has risen to $16.2m per organization in 2023, up from $15.4m in...
Image: Midjourney The BlackCat (ALPHV) ransomware gang now uses stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt...
TikTok is flooded by a surge of fake cryptocurrency giveaways posted to the video-sharing platform, with almost all of the...
A Chinese espionage-focused hacker tracked as 'Earth Lusca' was observed targeting government agencies in multiple countries, using a new Linux...
An estimated 12,000 Juniper SRX firewalls and EX switches are vulnerable to a fileless remote code execution flaw that attackers...
Passwords have long been used as the primary gatekeepers of digital security, yet they can also be a weak link...
The malware loader 'Bumblebee' has broken its two-month vacation with a new campaign that employs new distribution techniques that abuse...
The APT36 hacking group, aka 'Transparent Tribe,' has been observed using at least three Android apps that mimic YouTube to infect...
New malware named HTTPSnoop and PipeSnoop are used in cyberattacks on telecommunication service providers in the Middle East, allowing threat...
Scammers are impersonating the bankruptcy claim agent for crypto lender Celsius in phishing attacks that attempt to steal funds from...
GitLab has released security updates to address a critical severity vulnerability that allows attackers to run pipelines as other users...
The International Criminal Court (ICC) disclosed a cyberattack on Tuesday after discovering last week that its systems had been breached....
Trend Micro fixed a remote code execution zero-day vulnerability in the Trend Micro's Apex One endpoint protection solution that was actively exploited...
A Chinese-linked threat actor known as ‘Earth Lusca’ has been conducting cyber espionage campaigns against governments around the world via...
This week’s big news is the extortion attacks on the Caesars and MGM Las Vegas casino chains, with one having...
9/15/23 update added below. Trucking and fleet management solutions provider ORBCOMM has confirmed that a ransomware attack is behind recent service...
Software company Retool says the accounts of 27 cloud customers were compromised following a targeted and multi-stage social engineering attack....
Google has announced the Auto Update Expiration (AUE) date will be extended from 5 years to 10 for all Chromebooks, guaranteeing...
Yet another Nevadan casino and hotel chain giant has been compromised by ransomware threat actors, after Caesars Entertainment reported a...
Four out of five (80.3%) security vulnerabilities observed in organizations across all sectors come from a cloud environment, Palo Alto...
Threat actors use Google Ads tracking templates as a loophole to create convincing Webex software search ads that redirect users...
With payment card information being an enticing target for cyber attackers, the safeguarding of payment card transactions is of utmost...