A security flaw has been disclosed in OpenWrt’s Attended Sysupgrade (ASU) feature that, if successfully exploited, could have been abused…
Security
A now-removed GitHub repository that advertised a WordPress tool to publish posts to the online content management system (CMS) is…
Thai government officials have emerged as the target of a new campaign that leverages a technique called DLL side-loading to…
Germany’s Federal Office of Information Security (BSI) has announced that it has disrupted a malware operation called BADBOX that came…
The Cybersecurity and Infrastructure Security Agency (CISA) and the Environmental Protection Agency (EPA) have jointly released a crucial fact sheet…
The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia’s…
The latest Sensor Intelligence Report from Cyble, dated December 4–10, 2024, sheds light on a troubling increase in cyber threats,…
Rhode Island is tackling with a major cybersecurity breach that has compromised the personal information of thousands of residents. The…
Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting…
Telecom Namibia has fallen victim to a cyberattack, resulting in the leak of over 400,000 customer files. The Telecom Namibia…
A view of the H2 2024 threat landscape as seen by ESET telemetry and from the perspective of ESET threat…
Cybersecurity researchers are calling attention to a new kind of investment scam that leverages a combination of social media malvertising,…
With the evolution of modern software development, CI/CD pipeline governance has emerged as a critical factor in maintaining both agility…
This past week has been packed with unsettling developments in the world of cybersecurity. From silent but serious attacks on…
A Serbian journalist had his phone first unlocked by a Cellebrite tool and subsequently compromised by a previously undocumented spyware…
Rydox, an online marketplace used by cybercriminals to sell hacked personal information and tools to commit fraud, has been seized…
ESET Chief Security Evangelist Tony Anscombe looks at some of the report’s standout findings and their implications for staying secure…
Cybersecurity researchers have shed light on a previously undocumented aspect associated with ClickFix-style attacks that hinge on taking advantage of…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added two security flaws to its Known Exploited Vulnerabilities (KEV)…
A little-known cyber espionage actor known as The Mask has been linked to a new set of attacks targeting an…