Node.js Users Beware: Manifest Confusion Attack Opens Door to Malware
The npm registry for the Node.js JavaScript runtime environment is susceptible to what's called a manifest confusion attack that could...
The npm registry for the Node.js JavaScript runtime environment is susceptible to what's called a manifest confusion attack that could...
No less than 330,000 FortiGate firewalls are still unpatched and vulnerable to CVE-2023-27997, a critical security flaw affecting Fortinet devices...
An e-crime actor of Mexican provenance has been linked to an Android mobile malware campaign targeting financial institutions globally, but...
The Swedish data protection watchdog has warned companies against using Google Analytics due to risks posed by U.S. government surveillance,...
The threat actors behind the DDoSia attack tool have come up with a new version that incorporates a new mechanism...
In today's fast-paced digital landscape, the widespread adoption of AI (Artificial Intelligence) tools is transforming the way organizations operate. From...
A Chinese nation-state group has been observed targeting Foreign Affairs ministries and embassies in Europe using HTML smuggling techniques to...
In today's fast-paced digital landscape, the widespread adoption of AI (Artificial Intelligence) tools is transforming the way organizations operate. From...
In yet another sign of a lucrative crimeware-as-a-service (CaaS) ecosystem, cybersecurity researchers have discovered a new Windows-based information stealer called...
Meta's WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in the kind of content that can...
Every website owner or webmaster grapples with the issue of spam on their website forms. The volume of spam can...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has placed a set of eight flaws to the Known Exploited Vulnerabilities...
Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the WinSCP...
Forget crypto spam accounts, Twitter's got another problem which involves bots and accounts promoting adult content and infiltrating Direct Messages and...
Cybersecurity researchers have released a new tool called 'Snappy' that can help detect fake or rogue WiFi access points that...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Image: Bing Create The BlackCat ransomware group (aka ALPHV) is running malvertizing campaigns to lure people into fake pages that...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Researchers have pulled back the curtain on an updated version of an Apple macOS malware called Rustbucket that comes with...
Charming Kitten, the nation-state actor affiliated with Iran's Islamic Revolutionary Guard Corps (IRGC), has been attributed to a bespoke spear-phishing...
As many as 200,000 WordPress websites are at risk of ongoing attacks exploiting a critical unpatched security vulnerability in the...
In today's fast-paced digital landscape, the widespread adoption of AI (Artificial Intelligence) tools is transforming the way organizations operate. From...
Chipmaking giant TSMC (Taiwan Semiconductor Manufacturing Company) denied being hacked after the LockBit ransomware gang demanded $70 million not to...
A case of mistaken identity and further MOVEit Transfer data breaches continue dominated the ransomware news cycle this week. This...