A vulnerability in the 7-Zip file software allows attackers to bypass the Mark of the Web (MotW) Windows security feature.…
A former CIA analyst, Asif William Rahman, pleaded guilty to leaking top-secret National Defense Information on social media in 2024.…
Researchers warn of a campaign exploiting AVTECH IP cameras and Huawei HG532 routers to create a Mirai botnet variant called…
CERT-UA warned of scammers impersonating the agency, using fake AnyDesk requests to conduct fraudulent security audits. The Computer Emergency Response…
Kaspersky researchers shared details about multiple vulnerabilities impacting the Mercedes-Benz MBUX infotainment system. Kaspersky published research findings on the first-generation…
HPE is probing claims by the threat actor IntelBroker who is offering to sell alleged stolen source code and data…
Researchers linked the threat actor DoNot Team to a new Android malware that was employed in highly targeted cyber attacks. CYFIRMA…
Researchers found malicious npm and PyPI packages capable of stealing and deleting sensitive data from infected systems. Socket researchers have…
Critical flaws in WGS-804HPT switches could be chained to gain remote code execution on Planet Technology's industrial devices. The Planet…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Stealthy…
This website uses cookies.