Cybersecurity experts warn of ongoing attacks aimed at exploiting a recently patched critical vulnerability in F5 BIG-IP and BIG-IQ networking…
Experts found vulnerabilities in two WordPress plugins that could be exploited to run arbitrary code and potentially take over a…
Unknown threat actors have been using a new XcodeSpy Mac malware to target software developers who use Apple’s Xcode integrated…
China-linked cyber espionage group APT31 is believed to be behind an attack on the Parliament of Finland that took place…
Egyptian security researcher Sayed Abdelhafiz discovered multiple bugs in TikTok Android Application that can be chained to achieve Remote code…
Chinese APT groups are targeting telecom companies in cyberespionage campaigns collectively tracked as Operation Diànxùn, to steal 5G secrets. Chinese-language…
Netlab 360 experts discovered a new Mirai-based botnet dubbed ZHtrap that implements honeypot to find more victims. Researchers from Netlab…
Crooks devised a new method to hide credit card data siphoned from compromised e-stores, experts observed hackers hiding data in…
Microsoft released an Exchange On-premises Mitigation Tool (EOMT) tool to small businesses for the fix of ProxyLogon vulnerabilities. On March…
Microsoft is reportedly investigating whether the recent attacks against Microsoft Exchange servers could be linked to information leaked by a…
This website uses cookies.