Several popular Android applications available in Google Play Store are susceptible to a path traversal-affiliated vulnerability that could be exploited by a…
Security
CEO Andrew Witty testified before Congress on Wednesday, disclosing a significant cyberattack on Change Healthcare, a subsidiary of UnitedHealth Group.…
The CL0P ransomware group has listed 3 additional victims on its leak site. The mentioned victims include: McKinley Packing, Pilot…
A never-before-seen botnet called Goldoon has been observed targeting D-Link routers with a nearly decade-old critical security flaw with the goal of using the compromised devices…
Like antivirus software, vulnerability scans rely on a database of known weaknesses. That’s why websites like VirusTotal exist, to give…
Cloud storage services provider Dropbox on Wednesday disclosed that Dropbox Sign (formerly HelloSign) was breached by unidentified threat actors, who accessed emails, usernames,…
Over a million Australians who frequented pubs and clubs have likely had their critical information exposed in Outabox data breach,…
Anonymous Arabia, a notorious group of hacktivists, has allegedly launched a cyberattack on Columbia University in response to the recent…
A new malware called Cuttlefish is targeting small office and home office (SOHO) routers with the goal of stealthily monitoring all traffic through the devices and…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical flaw impacting GitLab to its Known Exploited Vulnerabilities (KEV) catalog,…
The UK Government takes aim at IoT devices shipping with weak or default passwords, an identity thief spends two years…
The cybersecurity community is on edge after an unidentified threat actor operating under the username ‘UAE’, claimed responsibility for a…
A forensic analysis of a graph dataset containing transactions on the Bitcoin blockchain has revealed clusters associated with illicit activity…
Cybersecurity researchers have discovered a previously undocumented malware targeting Android devices that uses compromised WordPress sites as relays for its…
The authors behind the resurfaced ZLoader malware have added a feature that was originally present in the Zeus banking trojan that it’s based on, indicating that it’s being…
National Supply Chain Day, which was recently observed on April 29, serves as a dedicated day to recognize the critical…
There’s a natural human desire to avoid threatening scenarios. The irony, of course, is if you hope to attain any semblance…
A threat actor has claimed to have leaked the database of the Department of Social Welfare Ladakh, Government of India.…
Faced with expanding attack surfaces and a barrage of threats, businesses of all sizes are increasingly looking to unlock the…
A former employee of the U.S. National Security Agency (NSA) has been sentenced to nearly 22 years (262 months) in…