A Moscow-based company sanctioned by the U.S. earlier this year has been linked to yet another influence operation designed to…
Security
U.S. telecom service provider T-Mobile said it recently detected attempts made by bad actors to infiltrate its systems in recent…
Oracle’s Agile Product Lifecycle Management (PLM) software has been flagged for a security vulnerability (CVE-2024-21287) by CERT-In (Computer Emergency Response Team…
A popular open-source game engine called Godot Engine is being misused as part of a new GodLoader malware campaign, infecting…
Cybersecurity researchers have discovered a software supply chain attack that has remained active for over a year on the npm…
The Australian government has passed the new Cyber Security Act, which was recently approved by Parliament. One of the most…
Serverless environments, leveraging services such as AWS Lambda, offer incredible benefits in terms of scalability, efficiency, and reduced operational overhead.…
What makes Mimic particularly unusual is that it exploits the API of a legitimate Windows file search tool (“Everything” by…
Nearly two dozen security vulnerabilities have been disclosed in Advantech EKI industrial-grade wireless access point devices, some of which could…
ESET Research details the analysis of a previously unknown vulnerability in Mozilla products exploited in the wild and another previously…
The backdoor can execute commands and lets attackers download additional modules onto the victim’s machine, ESET research finds Source: Read…
A threat actor named Matrix has been linked to a widespread distributed denial-of-service (DoD) campaign that leverages vulnerabilities and misconfigurations…
Artificial Intelligence (AI) has become a critical enabler across sectors, reshaping industries from healthcare to transportation. However, with its transformative…
An INTERPOL-led operation has led to the arrest of 1,006 suspects across 19 African countries and the takedown of 134,089…
A Russia-aligned hacking group, known as RomCom (also identified as Storm-0978, Tropical Scorpius, or UNC2596), has successfully exploited two zero-day…
The threat actor known as APT-C-60 has been linked to a cyber attack targeting an unnamed organization in Japan that…
Multi-stage cyber attacks, characterized by their complex execution chains, are designed to avoid detection and trick victims into a false…
Breaches of major U.S. telecom networks by the China-linked Salt Typhoon group have received widespread media attention, but a second…
A critical security flaw impacting the ProjectSend open-source file-sharing application has likely come under active exploitation in the wild, according…
Cybersecurity researchers have shed light on what has been described as the first Unified Extensible Firmware Interface (UEFI) bootkit designed…