A group of researchers from the Georgia Institute of Technology discovered malicious plugins on tens of thousands of WordPress sites.…
The U.S. FBI warns investors that crooks are increasingly exploiting security issues in Decentralized Finance (DeFi) platforms to steal cryptocurrency.…
The U.S. FTC sued US data broker Kochava for selling sensitive and precise geolocation data collected from hundreds of millions…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added 10 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…
Atlassian addressed a critical vulnerability in Bitbucket Server and Data Center that could lead to malicious code execution on vulnerable instances. Atlassian…
The threat actors behind Twilio and Cloudflare attacks have been linked to a phishing campaign that targeted other 136 organizations. The threat actors…
GAIROSCOPE: An Israeli researcher demonstrated how to exfiltrate data from air-gapped systems using ultrasonic tones and smartphone gyroscopes. The popular…
The threat actors behind a large-scale adversary-in-the-middle (AiTM) phishing campaign now target Google G Suite users The threat actors behind a large-scale…
VMware this week released patches to address an important-severity vulnerability in the VMware Tools suite of utilities. The virtualization giant…
This website uses cookies.