A vulnerability in the WinRAR is a trialware file archiver utility for Windows could be exploited by a remote attacker…
The United States Department of Justice sentenced two individuals that were providing bulletproof hosting to various malware operations. The United…
The Commerce Department's Bureau of Industry and Security (BIS) would ban U.S. firms from selling hacking tools to authoritarian regimes.…
Threat actors are continually looking for better ways to target organizations, here are the top five attack vectors to look…
A Cookie Theft malware was employed in phishing attacks against YouTube creators, Google's Threat Analysis Group (TAG) warns. Financially motivated…
Researchers warn of a new evolution of the PurpleFox botnet, operators included exploits and leverage WebSockets for C2 communication. Researchers…
Tech giant Acer was hacked again in a few days, after the compromise of the servers in India, threat actors…
China-linked cyberespionage group LightBasin hacked mobile telephone networks around the world and used specialized tools to access calling records. A…
Zero-day exploit broker Zerodium announced it is looking for zero-day vulnerabilities in the Windows clients of ExpressVPN, NordVPN, and Surfshark.…
Sentinel Labs experts have analyzed the new Karma ransomware and speculate it represents an evolution of the Nemty ransomware operation.…
This website uses cookies.