Researcher received a $70k award for a Google Pixel lock screen bypass
Google fixed a high-severity security bug affecting all Pixel smartphones that can allow attackers to unlock the devices. Google has...
Google fixed a high-severity security bug affecting all Pixel smartphones that can allow attackers to unlock the devices. Google has...
Microsoft linked Prestige ransomware attacks against organizations in Ukraine and Poland to Russia-linked threat actors. In Mid-October, Microsoft Threat Intelligence...
Apple released out-of-band patches for iOS and macOS to fix a couple of code execution vulnerabilities in the libxml2 library....
Experts discovered a malicious package on the Python Package Index (PyPI) that uses steganographic to hide malware within image files....
A flaw in the ABB Totalflow system used in oil and gas organizations could be exploited by an attacker to...
This can be achieved in the following steps: Create a new dataset (.csv) for upload in the following format...
Russia-linked APT29 cyberespionage group exploited a Windows feature called Credential Roaming to target a European diplomatic entity. Mandiant researchers in...
Lenovo fixed two high-severity flaws impacting various laptop models that could allow an attacker to deactivate UEFI Secure Boot. Lenovo...
Google Project Zero researchers reported that a surveillance vendor is using three Samsung phone zero-day exploits. Google Project Zero disclosed...
Experts noticed that the Amadey malware is being used to deploy LockBit 3.0 ransomware on compromised systems. Researchers from AhnLab Security Emergency...
Microsoft Patch Tuesday updates for November 2022 addressed 64 vulnerabilities, including six actively exploited zero-days. Microsoft Patch Tuesday updates for...
Cobalt Strike Beacon Object File (BOF) that uses WinStationConnect API to perform local/remote RDP session hijacking. With a valid access...
VMware address three critical bugs in the Workspace ONE Assist solution that allow remote attackers to bypass authentication and elevate...
Citrix released security updates to address a critical authentication bypass vulnerability in Citrix ADC and Citrix Gateway. Citrix is urging...
Researchers observed a SmokeLoader campaign that is distributing a new clipper malware dubbed Laplas Clipper that targets cryptocurrency users. Cyble...
Australian health insurer Medibank confirmed that personal data belonging to around 9.7 million current and former customers were exposed as...
The U.S. Department of Justice condemned James Zhong, a hacker who stole 50,000 bitcoins from the Silk Road dark net...
Threats actors calling themselves “Justice Blade” published leaked data from an outsourcing IT vendor. The group of threat actors calling...
The phishing-as-a-service (PhaaS) platform Robin Banks migrated its infrastructure to DDoS-Guard, a Russian bulletproof hosting service. The phishing-as-a-service (PhaaS) platform Robin...
Expert warns that the US and Israel are still unprepared to defeat a cyber attack against organizations in the water...
Combination of Once you have run setup.sh, the next steps are: Configure SMS message template. You will use Text only...
The UK National Cyber Security Centre (NCSC) announced that is scanning all Internet-exposed devices hosted in the UK for vulnerabilities....
Researchers uncovered a campaign abusing Microsoft Dynamics 365 customer voice to steal credentials from the victims. Microsoft’s Dynamics 365 Customer...
The ransomware group LockBit claimed to have stolen data from consulting and IT services provider Kearney & Company. Kearney is...