Critical zero-day flaw exploited for 7 months! Backdoor access, data exfiltration, and 3 potent malware strains discovered.
A new phishing technique called "file archiver in the browser" can be leveraged to "emulate" a file archiver software in a ...
AceCryptor: the crypter malware that packs a punch! Since 2016, it's been hiding numerous strains of malware under its cloak ...
The Python Package Index (PyPI) now requires 2-factor authentication for all project maintainers to combat account takeover ...
Linux routers in Japan are the target of a new Golang remote access trojan (RAT) called GobRAT. "Initially, the attacker ...
Beware of the relentless Bandit Stealer info-stealer malware, wreaking havoc on web browsers & crypto wallets worldwide.
North Korean Lazarus Group remains relentless in targeting vulnerable Microsoft IIS servers, utilizing DLL side-loading ...
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting state bodies in the country ...
Apple releases essential security updates for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web browser to counter three zero ...
Android Spyware 'Predator' Records Your Calls, Steals Messages, and More! Discover more about its chilling capabilities.
A critical vulnerability in Expo.io's OAuth implementation puts user accounts at risk of hijacking and data theft on popular ...
The infamous cybercrime syndicate FIN7 is back in business, launching their first ransomware campaign in years.