U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Langflow flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and…
Google addressed 46 Android security vulnerabilities, including one issue that has been exploited in attacks in the wild. Google's monthly…
A new BYOI technique lets attackers bypass SentinelOne EDR, disable protection, and deploy Babuk ransomware by exploiting the agent upgrade…
Kelly Benefits has determined that the impact of the recently disclosed data breach is much bigger than initially believed. Benefits…
A hacker stole data from TeleMessage, exposing messages from its modified Signal, WhatsApp, and other apps sold to the U.S.…
MintsLoader is a malware loader delivering the GhostWeaver RAT via a multi-stage chain using obfuscated JavaScript and PowerShell. Recorded Future…
Supply chain attack via 21 backdoored Magento extensions hit 500–1,000 e-stores, including a $40B multinational. Sansec researchers reported that multiple…
A 36-year-old Yemeni man behind Black Kingdom ransomware is indicted in the U.S. for 1,500 attacks on Microsoft Exchange servers.…
Researchers found 3 malicious Go modules with hidden code that can download payloads to wipe a Linux system's main disk,…
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape io_uring…
This website uses cookies.