Cyberattacks through Browser Extensions – the Importance of MFA
There are many avenues of attack that a threat actor can take. One that has been increasing in recent years...
There are many avenues of attack that a threat actor can take. One that has been increasing in recent years...
Since at least May 2021, stealthy Linux malware called AVrecon was used to infect over 70,000 Linux-based small office/home office...
In the fast-paced world of cybersecurity, strategic technical partnerships are crucial for staying ahead of emerging threats. Criminal IP, a...
Image: Bing Create The administrators of the Genesis Market for stolen credentials announced on a hacker forum that they sold...
Colorado State University (CSU) has confirmed that the Clop ransomware operation stole sensitive personal information of current and former students...
Rockwell Automation says a new remote code execution (RCE) exploit linked to an unnamed Advanced Persistent Threat (APT) group could...
The All-In-One Security (AIOS) WordPress security plugin, used by over a million WordPress sites, was found to be logging plaintext...
Conor Brian Fitzpatrick, aka Pompompurin, the owner of the notorious BreachForums (aka Breached) hacking forum, has pleaded guilty to hacking...
What's old is new again, with researchers seeing a threefold increase in malware distributed through USB drives in the first...
Cybersecurity researchers and threat actors are targeted by a fake proof of concept (PoC) CVE-2023-35829 exploit that installs a Linux...
The Cisco SD-WAN vManage management software is impacted by a flaw that allows an unauthenticated, remote attacker to gain read...
The source code for the BlackLotus UEFI bootkit has leaked online, allowing greater insight into a malware that has caused...
Zimbra urged admins today to manually fix a zero-day vulnerability actively exploited to target and compromise Zimbra Collaboration Suite (ZCS)...
Image: Bing Create Data from the first half of the year indicates that ransomware activity is on track to break...
Fortinet has disclosed a critical severity flaw impacting FortiOS and FortiProxy, allowing a remote attacker to perform arbitrary code execution...
A Chinese hacking group has breached the email accounts of more than two dozen organizations worldwide, including U.S. and Western...
The Russian state-sponsored hacking group 'APT29' (aka Nobelium, Cloaked Ursa) has been using unconventional lures like car listings to entice...
GitHub announced today the introduction of passwordless authentication support in public beta, allowing users to upgrade from security keys to...
Image: Bing Create Ghostscript, an open-source interpreter for PostScript language and PDF files widely used in Linux, has been found...
SonicWall warned customers today to urgently patch multiple critical vulnerabilities impacting the company's Global Management System (GMS) firewall management and...
A new fileless malware named PyLoose has been targeting cloud workloads to hijack their computational resources for Monero cryptocurrency mining....
Microsoft disclosed today an unpatched zero-day security bug in multiple Windows and Office products exploited in the wild to gain...
Microsoft blocked code signing certificates predominantly used by Chinese hackers and developers to sign and load malicious kernel mode drivers...
Deutsche Bank AG has confirmed to BleepingComputer that a data breach on one of its service providers has exposed its...