New FakeCall Malware Variant Hijacks Android Devices for Fraudulent Banking Calls
Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka...
Cybersecurity researchers have discovered a new version of a well-known Android malware family dubbed FakeCall that employs voice phishing (aka...
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical warning regarding software vulnerabilities affecting industrial devices. This alert...
Cybersecurity insights reveal that Chinese hackers have developed stealthier techniques over recent years, shifting from broad attacks to targeted strategies....
The warning from the US and Israel highlights the evolving tactics of the Iranian state-sponsored group Cotton Sandstorm, now leveraging...
U.S. and Israeli cybersecurity agencies have published a new advisory attributing an Iranian cyber group to targeting the 2024 Summer...
Microsoft is further delaying the release of its controversial Recall feature for Windows Copilot+ PCs, stating it's taking the time...
With so many SaaS applications, a range of configuration options, API capabilities, endless integrations, and app-to-app connections, the SaaS risk...
Microsoft has revealed that a Chinese threat actor it tracks as Storm-0940 is leveraging a botnet called Quad7 to orchestrate...
Cybersecurity researchers have flagged a "massive" campaign that targets exposed Git configurations to siphon credentials, clone private repositories, and even...
Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within...
Cybersecurity researchers have disclosed a new phishing kit that has been put to use in campaigns targeting Australia, Japan, Spain,...
In a concerning trend, 81% of US small businesses faced data breaches last year, compelling many to ramp up their...
The Emeraldwhale attack has revealed vulnerabilities in misconfigured Git configurations, leading to the theft of over 15,000 cloud service credentials....
Chinese-sponsored hackers have compromised at least 20 Canadian government networks over the past four years, raising alarms about national security....
The Xiu Gou phishing kit is a new cyber threat targeting users in the US, UK, Australia, Japan, and Spain,...
A North Korean-backed hacking group has taken a significant step by engaging in a ransomware campaign, marking a notable shift...
The government sector is witnessing a troubling 236% surge in malware attacks, highlighting an urgent need for enhanced cybersecurity measures....
LottieFiles has revealed that its npm package "lottie-player" was compromised as part of a supply chain attack, prompting it to...
Cybersecurity researchers have discovered an improved version of an Apple iOS spyware called LightSpy that not only expands on its...
In the modern, browser-centric workplace, the corporate identity acts as the frontline defense for organizations. Often referred to as "the...
A high-severity security flaw has been disclosed in the LiteSpeed Cache plugin for WordPress that could allow an unauthenticated threat...
The Midnight Blizzard spearphishing campaign poses a serious threat, targeting thousands with malicious RDP files and information-stealing tactics. Microsoft has...
The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled its inaugural international strategic plan aimed at enhancing global collaboration in...
Apple has implemented vital security updates across its operating systems, enhancing protection against vulnerabilities in macOS and iOS. On October...