The dreaded Proton malware was spreading through a new supply-chain attack that involved the Elmedia apps, victims should wipe their…
Canada’s Communications Security Establishment (CSE) intel agency has released the source code for one of its malware analysis tools dubbed…
Operators behind Locky ransomware campaigns have switched to new attack techniques to evade detection leveraging the DDE protocol. Security experts are continuing to observe…
Malware researchers at Check Point have uncovered a new massive IoT botnet that presented many similarities with the dreaded Mirai. The…
Some kid smartwatches available for sale in Europe pose security and privacy risks, including potentially allowing hackers to take control…
Trend Micro recently observed a new campaign leveraging the Ursnif banking Trojan using new malicious macro tactics payload delivery and evade…
Google has launched Google Play Security Reward, the bug bounty program that will pay $1,000 rewards for flaws in popular…
Cisco patched critical and high severity vulnerabilities in several products, including the Cloud Services Platform (CSP). Cisco patched critical and…
Threat actors in the wild are mass-scanning websites for directories containing SSH private keys to hack them. The SSH allows a…
Microsoft’s Offensive Security Research (OSR) team disclosed a remote code execution vulnerability in the Chrome web browser. Microsoft’s Offensive Security Research…
This website uses cookies.