The recently launched Industrial Spy data extortion marketplace has now started its ransomware operation. In April, Malware HunterTeam and Bleeping…
GitHub provided additional details into the theft of its integration OAuth tokens that occurred in April, with nearly 100,000 NPM users' credentials.…
Microsoft found several high-severity vulnerabilities in a mobile framework used in pre-installed Android System apps. The Microsoft 365 Defender Research…
The FBI warns organizations in the higher education sector of credentials sold on cybercrime forums that can allow threat actors…
Security researchers released PoC exploit code for the critical authentication bypass vulnerability CVE-2022-22972 affecting multiple VMware products. Horizon3 security researchers…
An investigation of the infamous “Is That You?” video scam led Cybernews researchers into exposing threat actors who are poisoning…
Zyxel addressed multiple vulnerabilities impacting many of its products, including APs, AP controllers, and firewalls. Zyxel has released security updates…
Researchers warn of a new malvertising campaign spreading the ChromeLoader malware that hijacks the victims' browsers. Researchers from Red Canary…
The maintainers of the Tails project (The Amnesic Incognito Live System) warn users that the Tor Browser bundled with the…
An unknown APT group is targeting Russian government entities since the beginning of the Russian invasion of Ukraine. Researchers from…
This website uses cookies.