Experts Identify Fully-Featured Info Stealer and Trojan in Python Package on PyPI
A malicious Python package uploaded to the Python Package Index (PyPI) has been found to contain a fully-featured information stealer...
A malicious Python package uploaded to the Python Package Index (PyPI) has been found to contain a fully-featured information stealer...
Misconfigured Redis database servers are the target of a novel cryptojacking campaign that leverages a legitimate and open source command-line...
As a primary working interface, the browser plays a significant role in today's corporate environment. The browser is constantly used...
The threat actor known as Lucky Mouse has developed a Linux version of a malware toolkit called SysUpdate, expanding on...
Cisco on Wednesday rolled out security updates to address a critical flaw impacting its IP Phone 6800, 7800, 7900, and...
Six different law firms were targeted in January and February 2023 as part of two disparate threat campaigns distributing GootLoader...
A stealthy Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus has become the first publicly known malware capable of bypassing...
Google has announced the general availability of client-side encryption (CSE) for Gmail and Calendar, months after piloting the feature in...
Employee well-being has become a primary focus for many businesses. Even before the pandemic, the C-suite was acutely aware of...
Cryptocurrency companies are being targeted as part of a new campaign that delivers a remote access trojan called Parallax RAT....
A new post-exploitation framework called EXFILTRATOR-22 (aka EX-22) has emerged in the wild with the goal of deploying ransomware within...
Romanian cybersecurity company Bitdefender has released a free decryptor for a new ransomware strain known as MortalKombat. MortalKombat is a...
As digital transformation takes hold and businesses become increasingly reliant on digital services, it has become more important than ever...
The threat actor known as Blind Eagle has been linked to a new campaign targeting various key industries in Colombia....
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw affecting the ZK Framework to its Known...
LastPass, which in December 2022 disclosed a severe data breach that allowed threat actors to access encrypted password vaults, said...
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies like Nissan...
The RIG exploit kit (EK) touched an all-time high successful exploitation rate of nearly 30% in 2022, new findings reveal....
Spoiler Alert: Organizations with 10,000 SaaS users that use M365 and Google Workspace average over 4,371 additional connected apps. SaaS-to-SaaS...
Government entities in Asia-Pacific and North America are being targeted by an unknown threat actor with an off-the-shelf malware downloader...
The PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called x64dbg in an...
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies like Nissan...
A new ChromeLoader malware campaign has been observed being distributed via virtual hard disk (VHD) files, marking a deviation from...
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major companies like Nissan...