Counter-Strike 2 HTML injection bug exposes players’ IP addresses
Valve has reportedly fixed an HTML injection flaw in CS2 that was heavily abused today to inject images into games...
Valve has reportedly fixed an HTML injection flaw in CS2 that was heavily abused today to inject images into games...
Roughly 38% of applications using the Apache Log4j library are using a version vulnerable to security issues, including Log4Shell, a...
Security researchers developed a new attack, which they named AutoSpill, to steal account credentials on Android during the autofill operation....
A law enforcement operation is rumored to be behind an outage affecting ALPHV ransomware gang's websites over the last 30...
Elevation of privilege flaws are the most common vulnerability leveraged by corporate insiders when conducting unauthorized activities on networks, whether...
Amazon's Customer Protection and Enforcement team has taken legal action against an underground store refund scheme that has resulted in...
Kentucky health system Norton Healthcare has confirmed that a ransomware attack in May exposed personal information belonging to patients, employees,...
A new set of vulnerabilities in 5G modems by Qualcomm and MediaTek, collectively called "5Ghoul," impact 710 5G smartphone models...
Security researchers discovered a remote access trojan they named Krasue that is targeting Linux systems of telecommunications companies and managed...
Meta has announced that the immediate availability of end-to-end encryption for all chats and calls made through the Messenger app, as...
The UK National Cyber Security Centre (NCSC) and Microsoft warn that the Russian state-backed actor "Callisto Group" (aka "Seaborgium" or...
As Genetic testing provider 23andMe faces multiple lawsuits for an October credential stuffing attack that led to the theft of...
Russian national Anatoly Legkodymov pleaded guilty to operating the Bitzlato cryptocurrency exchange that helped ransomware gangs and other cybercriminals launder...
Russian APT28 military hackers used Microsoft Outlook zero-day exploits to target multiple European NATO member countries, including a NATO Rapid...
WordPress has released version 6.4.2 that addresses a remote code execution (RCE) vulnerability that could be chained with another flaw to...
A recent report has revealed that 40.2% of files stored on Google Drive contain sensitive data.The findings come from the...
A set of 21 newly discovered vulnerabilities impact Sierra OT/IoT routers and threaten critical infrastructure with remote code execution, unauthorized...
Japanese car maker Nissan is investigating a cyberattack that targeted its systems in Australia and New Zealand, which may have...
Athena AI, the new generative AI layer that spans across the entire Varonis Data Security Platform, redefines how security teams...
Austal USA, a shipbuilding company and a contractor for the U.S. Department of Defense (DoD) and the Department of Homeland...
Atlassian has published security advisories for four critical remote code execution (RCE) vulnerabilities impacting Confluence, Jira, and Bitbucket servers, along with...
Academic researchers developed a new side-channel attack called SLAM that exploits hardware features designed to improve security in upcoming CPUs...
A U.S. senator revealed today that government agencies worldwide demand mobile push notification records from Apple and Google users to...
More than a dozen malicious loan apps, which are generically named SpyLoan, have been downloaded more than 12 million times this...