Fake Captcha Campaign Exposes Malvertising Network Risks
The fake captcha campaign illustrates significant risks within malvertising networks, endangering users by distributing Lumma infostealer malware. A new large-scale...
The fake captcha campaign illustrates significant risks within malvertising networks, endangering users by distributing Lumma infostealer malware. A new large-scale...
Amnesty International’s latest findings reveal that the Serbian government employs sophisticated spyware to track journalists and civil rights activists. The...
Ofcom has unveiled essential guidance aimed at helping tech firms address online harms, fulfilling requirements set by the Online Safety...
The European Union has taken decisive action by imposing sanctions on Russian cyber actors for their disruptive activities abroad. This...
The US government has unveiled a draft of the National Cyber Incident Response Plan (NCIRP), outlining vital roles for organizations...
Supplier breaches have emerged as a significant risk for all major European financial firms, highlighting vulnerabilities in the supply chain....
New research reveals that attackers can discover unprotected APIs in under 30 seconds, raising significant security concerns for businesses. According...
As Generative AI (GenAI) continues to capture the attention of cybersecurity leaders, a recent survey sheds light on the nuanced...
A significant data breach at Texas Tech University Health Sciences Center has impacted the personal and medical information of 1.4...
The European Commission is investigating TikTok for potential violations of the Digital Services Act amid concerns of foreign interference in...
Recent findings reveal how cybercriminals are creatively leveraging Google Calendar to bypass email security measures, making it crucial for users...
Meta has faced a hefty GDPR fine of €251 million ($263 million) due to a significant 2018 data breach that...
A sophisticated phishing attack has been identified, targeting the Turkish defense sector, revealing the advanced tactics of the TA397 threat...
A surge in malicious campaigns is exploiting VSCode extensions and npm packages, threatening local development environments and software supply chains....
Nigeria is intensifying efforts to combat cryptocurrency investment fraud and romance scams, as evidenced by a significant recent arrest in...
Phishing attacks have surged dramatically in 2024, highlighted by a staggering 202% increase in phishing messages, indicating an urgent need...
A new vishing technique via Microsoft Teams is being exploited by threat actors to distribute DarkGate malware, posing serious risks...
In a bid to enhance cybersecurity, the US government has mandated new cloud security requirements for federal agencies, addressing critical...
Updated Risk, Description, Source and Related Links.CVE-2024-30088 is being exploited in the wild. This is a Windows Kernel Time-of-check Time-of-use (TOCTOU)...
A vulnerability was identified in F5 Products. A remote attacker could exploit this vulnerability to trigger denial of service condition on the targeted...
Updated Risk, Description, Impact, Source and Related Links.CVE-2024-20767 is being exploited in the wild. An attacker who successfully exploited this...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesSystem Center Medium RiskElevation of Privilege Spoofing Microsoft Office Medium RiskElevation...