A critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection…
Security
Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages…
A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed…
Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions that could be exploited to bypass…
2023 CL0P Growth Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor the…
Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware…
As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access…
Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as…
Google has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption…
The ransomware industry surged in 2023 as it saw an alarming 55.5% increase in victims worldwide, reaching a staggering 5,070. But 2024 is…
Threat hunters have discovered a new malware called Latrodectus that has been distributed as part of email phishing campaigns since at least…
A new phishing campaign has set its eyes on the Latin American region to deliver malicious payloads to Windows systems.…
Google has filed a lawsuit against two app developers for engaging in an “international online consumer investment fraud scheme” that tricked users…
Threat actors have been found exploiting a critical flaw in Magento to inject a persistent backdoor into e-commerce websites. The…
New research has found that artificial intelligence (AI)-as-a-service providers such as Hugging Face are susceptible to two critical risks that…
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of compliance frameworks and…
Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional malware dubbed Byakugan. The starting point of the attack…
Multiple China-nexus threat actors have been linked to the zero-day exploitation of three security flaws impacting Ivanti appliances (CVE-2023-46805, CVE-2024-21887,…
Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA) are being targeted by a new version…
New research has found that the CONTINUATION frame in the HTTP/2 protocol can be exploited to conduct denial-of-service (DoS) attacks.…