Microsoft found several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps. The Microsoft 365 Defender Research…
Security researchers devised a technique, dubbed GhostTouch, to remotely control touchscreens using electromagnetic signals. A team of researchers from Zhejiang…
The FBI warns organizations in the higher education sector of credentials sold on cybercrime forums that can allow threat actors…
A new version of the ERMAC Android banking trojan is able to target an increased number of apps. The ERMAC…
Security researchers released PoC exploit code for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products. Horizon3 security researchers…
An investigation of the infamous “Is That You?” video scam led Cybernews researchers into exposing threat actors who are poisoning…
Zyxel addressed multiple vulnerabilities impacting many of its products, including APs, AP controllers, and firewalls. Zyxel has released security updates…
Researchers warn of a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims' browsers. Researchers from Red Canary…
The maintainers of the Tails project (The Amnesic Incognito Live System) warn users that the Tor Browser bundled with the…
Italy announced its National Cybersecurity Strategy for 2022/26, a crucial document to address cyber threats and increase the resilience of…
This website uses cookies.