Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin
Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to be associated with the e-crime...
Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to be associated with the e-crime...
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root...
A financially motivated threat actor is actively scouring the internet for unprotected Apache NiFi instances to covertly install a cryptocurrency...
The threat actors behind BlackCat ransomware have come up with an improved variant that prioritizes speed and stealth in an...
IT hygiene is a security best practice that ensures that digital assets in an organization's environment are secure and running...
WordPress has issued an automatic update to address a critical flaw in the Jetpack plugin that's installed on over five...
Cybersecurity researchers have offered a closer look at the RokRAT remote access trojan that's employed by the North Korean state-sponsored...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a recently patched critical security flaw in Zyxel gear to...
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root...
Toyota Motor Corporation has discovered two additional misconfigured cloud services that leaked car owners' personal information for over seven years....
With cyber-attacks becoming more sophisticated, organizations are becoming increasingly aware of the importance of safeguarding their web applications against security...
The Dark Pink APT hacking group continues to be very active in 2023, observed targeting government, military, and education organizations...
Hackers are performing widespread exploitation of a critical-severity command injection flaw in Zyxel networking devices, tracked as CVE-2023-28771, to install...
A threat actor known as Spyboy is promoting a tool called "Terminator" on a Russian-speaking hacking forum that can allegedly...
Kali Linux 2023.2, the second version of 2023, is now available with a pre-built Hyper-V image and thirteen new tools,...
A stealthy remote access trojan (RAT) named 'SeroXen' has recently gained popularity as cybercriminals begin using it for its low...
A researcher has published a working exploit for a remote code execution (RCE) flaw impacting ReportLab Toolkit, a popular Python...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of...
Multiple security flaws uncovered in Sonos One wireless speakers could be potentially exploited to achieve information disclosure and remote code...
Improperly deactivated and abandoned Salesforce Sites and Communities (aka Experience Cloud) could pose severe risks to organizations, leading to unauthorized...
Microsoft has shared details of a now-patched flaw in Apple macOS that could be abused by threat actors with root...
A financially motivated threat actor is actively scouring the internet for unprotected Apache NiFi instances to covertly install a cryptocurrency...
Cybersecurity researchers have found "backdoor-like behavior" within Gigabyte systems, which they say enables the UEFI firmware of the devices to...
Finding threat actors before they find you is key to beefing up your cyber defenses. How to do that efficiently...