Mozilla Firefox gets built-in Firefox Relay controls
Mozilla has announced the integration of Firefox Relay, an email protection system that helps users evade trackers and spammers, directly...
Mozilla has announced the integration of Firefox Relay, an email protection system that helps users evade trackers and spammers, directly...
An advanced hacking group named 'Winter Vivern' targets European government organizations and telecommunication service providers to conduct espionage. The group's...
Nord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in the hopes...
CISA has added a critical vulnerability impacting Adobe ColdFusion versions 2021 and 2018 to its catalog of security bugs exploited...
Cybercriminals are abusing Adobe Acrobat Sign, an online document signing service, to distribute info-stealing malware to unsuspecting users. The service...
A convincing Twitter scam is targeting bank customers by abusing the quote-tweet feature, as observed by BleepingComputer. What makes this scam stand out is...
A decryption tool for a modified version of the Conti ransomware could help hundreds of victims recover their files for...
In an unexpected twist, a Microsoft support engineer resorted to running an unofficial 'crack' on a customer's Windows PC after a genuine...
Latitude Financial Services (Latitude) has disclosed a data breach after suffering a cyberattack, causing the company to shut down internal...
Microsoft has released a script to make it easier to patch a BitLocker bypass security vulnerability in the Windows Recovery...
A suspected Chinese hacking group has been linked to a series of attacks on government organizations exploiting a Fortinet zero-day...
Project Zero, Google's zero-day bug-hunting team, discovered and reported 18 zero-day vulnerabilities in Samsung’s Exynos chipsets used in mobile devices,...
The BianLian ransomware group has shifted its focus from encrypting its victims' files to only exfiltrating data found on compromised...
Android malware 'FakeCalls' is circulating again in South Korea, imitating phone calls for over 20 financial organizations and attempting to...
The advanced persistent threat known as Winter Vivern has been linked to campaigns targeting government officials in India, Lithuania, Slovakia,...
The cryptojacking group known as TeamTNT is suspected to be behind a previously undiscovered strain of malware used to mine...
Threat activity clusters affiliated with the Chinese and Russian cybercriminal ecosystems have been observed using a new piece of malware...
Google is calling attention to a set of severe security flaws in Samsung's Exynos chips, some of which could be...
A coalition of law enforcement agencies across Europe and the U.S. announced the takedown of ChipMixer, an unlicensed cryptocurrency mixer...
Multiple threat actors, including a nation-state group, exploited a critical three-year-old security flaw in Progress Telerik to break into an...
In last year's edition of the Security Navigator we noted that the Manufacturing Industry appeared to be totally over-represented in...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on March 15 added a security vulnerability impacting Adobe ColdFusion to its...
A cyberespionage actor known as Tick has been attributed with high confidence to a compromise of an East Asian data-loss...
The stakes could not be higher for cyber defenders. With the vast amounts of sensitive information, intellectual property, and financial...