FrigidStealer: A New Threat for MacOS Users Uncovered by Proofpoint
The emergence of FrigidStealer highlights that MacOS devices are now targets for malware, shattering the myth of their immunity. The...
The emergence of FrigidStealer highlights that MacOS devices are now targets for malware, shattering the myth of their immunity. The...
A new variant of the Snake Keylogger is causing alarm among Windows users, as cybersecurity experts from Fortinet unveil its...
Critical vulnerabilities in OpenSSH have been identified, exposing systems to potential man-in-the-middle and denial-of-service attacks. Discover how to safeguard your...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...
Palo Alto Networks and SonicWall customers are urged to promptly address critical vulnerabilities affecting their firewall products. Palo Alto Networks...
Explore how Telegram is being utilized as a command and control (C2) channel for a newly discovered Golang malware variant....
South Korea has halted new downloads of the Chinese AI chatbot DeepSeek as it faces scrutiny for violating data protection...
A wave of DDoS attacks by the pro-Russia group NoName057(16) has targeted Italian banks and airports, prompting swift cybersecurity responses....
In a major development, two Estonian nationals have pled guilty to orchestrating a massive cryptocurrency Ponzi scheme, resulting in a...
Microsoft has identified a new variant of the XCSSET malware targeting MacOS users, focusing primarily on Xcode projects. This sophisticated...
China-linked espionage tools have emerged in a recent ransomware attack, pointing to new connections between state-sponsored activities and cybercrime. In...
The UK's AI Safety Institute has officially rebranded as the AI Security Institute, aligning with the government's renewed focus on...
Russian hackers are using device code phishing to compromise Microsoft 365 accounts, raising serious security concerns for users. In a...
North Korea's latest campaign, named Operation Marstech Mayhem, aims to distribute crypto-stealing malware via open source components, significantly threatening crypto...
In 2024, losses from romance baiting scams surged 40% year-on-year, highlighting a critical concern in the world of cryptocurrency fraud....
The Electronic Frontier Foundation (EFF) is spearheading a coalition to block Elon Musk’s Department of Government Efficiency (DOGE) from accessing...
Seashell Blizzard, a Russian state cyber-actor, has integrated a specialized initial access subgroup to enhance its global reach and compromise...
Discover the sophisticated phishing kit called Astaroth, known for its advanced techniques that effectively bypass two-factor authentication (2FA) to compromise...
CISA and the FBI have issued a crucial alert emphasizing the importance of eliminating buffer overflow vulnerabilities in software development....
A vulnerability was identified in F5 Products. A remote attacker could exploit this vulnerability to trigger remote code execution on...
In a significant move against cybercrime, the US, UK, and Australia have jointly enacted sanctions on the bulletproof hosting provider...
The CHERI Security Hardware Program under the Digital Security by Design (DSbD) initiative is crucial for enhancing UK cyber safety...
Security detection technology is falling short, with 74% of IT security leaders in the US and UK declaring it inadequate...
A massive IoT data breach has exposed 2.7 billion records, revealing sensitive information like Wi-Fi network names and passwords. A...