AI-Powered CryptoRom Scam Targets Mobile Users
CryptoRom, a notorious scam that combines fake cryptocurrency trading and romance scams, has taken a new twist by utilizing generative...
CryptoRom, a notorious scam that combines fake cryptocurrency trading and romance scams, has taken a new twist by utilizing generative...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infobiltay_technology -- scienta Improper Neutralization of Special Elements used in an SQL...
About 34% of security vulnerabilities impacting industrial control systems (ICSs) that were reported in the first half of 2023 have...
Cybersecurity researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows the AWS Systems Manager Agent...
A sophisticated Facebook phishing campaign has been observed exploiting a zero-day flaw in Salesforce's email services, allowing threat actors to...
A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group is actively modifying its infrastructure in...
In recent years the rise of illicit activities conducted within online messaging platforms has become a growing concern for countless...
Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat actors, including cybercrime groups...
Interrupted classes, disrupted planning, and postponed events – IT outages have a big impact on modern university life. But as...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of state hackers exploiting two flaws in Ivanti's Endpoint Manager...
American apparel retailer Hot Topic is notifying customers about multiple cyberattacks between February 7 and June 21 that resulted in...
In the wake of WormGPT, a ChatGPT clone trained on malware-focused data, a new generative artificial intelligence hacking tool called...
Security researchers are warning of increased phishing activity that abuses Google Accelerated Mobile Pages (AMP) to bypass email security measures...
Chinese state-sponsored hackers have been targeting industrial organizations with new malware that can steal data from air-gapped systems. Air-gapped systems...
Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM) as a zero-day...
Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equipped to fully take over Facebook business...
An NHS trust has been reprimanded by the UK’s data protection regulator after it was discovered that staff had been...
The boss of one of Europe’s largest outsourcing companies has announced his retirement, several months after the firm suffered a...
Security researchers have uncovered new loader malware under active development which uses multiple mechanisms to evade detection.Proofpoint said it detected...
A new report has shed light on critical cloud risks, with a focus on the growing threat of cloud tech...
A new and sophisticated malware campaign named “P2Pinfect” has been observed targeting publicly-accessible deployments of the Redis data store.According to a...
Canon has raised concerns over potential security risks linked to the disposal of inkjet printers. In a security advisory published on...
Unit 42 researchers have uncovered another phishing campaign designed to take over Facebook business accounts using a newly identified infostealer...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infobiltay_technology -- scienta Improper Neutralization of Special Elements used in an SQL...