A new version of the BRATA malware implements a functionality to perform a factory reset of the device to wipe…
The maintainers of the Rust programming language fixed a high-severity flaw that could allow attackers to delete files and directories…
Threat actors planted a backdoor into multiple WordPress themes and plugins after compromising the website of their developer. In a…
Russian authorities arrested four alleged members of the international cyber theft ring tracked as 'Infraud Organization.' In February 2008, the…
Experts warn Emotet malware campaign using "unconventional" IP address formats in an attempt to evade detection. Threat actors behind a…
The FBI warns that cybercriminals are using malicious QR codes to steal their credentials and financial info. The Federal Bureau of…
Cybersecurity provider F5 released security patches to address 25 vulnerabilities affecting its BIG-IP, BIG-IQ, and NGINX products. Cybersecurity firm F5…
US CISA added seventeen new actively exploited vulnerabilities to the 'Known Exploited Vulnerabilities Catalog'. The 'Known Exploited Vulnerabilities Catalog' is…
Cyberespionage group Molerats has been observed abusing legitimate cloud services, like Google Drive and Dropbox as attack infrastructure. Zscaler ThreatLabz…
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…
This website uses cookies.