A threat actor tracked as TA547 has targeted dozens of German organizations with an information stealer called Rhadamanthys as part of an invoice-themed phishing…
Security
GitGuardian is famous for its annual State of Secrets Sprawl report. In their 2023 report, they found over 10 million exposed passwords,…
Apple on Wednesday revised its documentation pertaining to its mercenary spyware threat notification system to mention that it alerts users when they…
Fortinet has released patches to address a critical security flaw impacting FortiClientLinux that could be exploited to achieve arbitrary code…
An active Android malware campaign dubbed eXotic Visit has been primarily targeting users in South Asia, particularly those in India…
Cybersecurity researchers have discovered a new Raspberry Robin campaign wave that propagates the malware through malicious Windows Script Files (WSFs)…
Threat actors are now taking advantage of GitHub’s search functionality to trick unsuspecting users looking for popular repositories into downloading…
The need for vCISO services is growing. SMBs and SMEs are dealing with more third-party risks, tightening regulatory demands and…
Cybersecurity researchers have disclosed what they say is the “first native Spectre v2 exploit” against the Linux kernel on Intel…
We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your…
Microsoft has released security updates for the month of April 2024 to remediate a record 149 flaws, two of which have…
A critical security flaw in the Rust standard library could be exploited to target Windows users and stage command injection…
Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages…
A threat group of suspected Romanian origin called RUBYCARP has been observed maintaining a long-running botnet for carrying out crypto mining, distributed…
Multiple security vulnerabilities have been disclosed in LG webOS running on its smart televisions that could be exploited to bypass…
2023 CL0P Growth Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor the…
Cybersecurity researchers have discovered an intricate multi-stage attack that leverages invoice-themed phishing decoys to deliver a wide range of malware…
As cyber threats loom around every corner and privileged accounts become prime targets, the significance of implementing a robust Privileged Access…
Threat actors are actively scanning and exploiting a pair of security flaws that are said to affect as many as…
Google has announced support for what’s called a V8 Sandbox in the Chrome web browser in an effort to address memory corruption…