The latest P2Pinfect botnet variants are targeting devices with 32-bit MIPS processors, commonly found in routers and IoT devices. Discovered [...]

The latest P2Pinfect botnet variants are targeting devices with 32-bit MIPS processors, commonly found in routers and IoT devices. Discovered [...]
LogoFAIL is a set of security vulnerabilities impacting image-parsing components within UEFI code across different vendors. These vulnerabilities pose a [...]
Google released security updates for Chrome, addressing seven issues, including a high-severity zero-day vulnerability (CVE-2023-6345) in the Skia 2D graphics [...]
Recent reports indicate that Google Drive users are experiencing the sudden disappearance of their most recent files stored in the [...]
A newly identified Mirai-based malware botnet named 'InfectedSlurs' is leveraging two zero-day remote code execution (RCE) vulnerabilities to infect routers [...]
The Lumma information-stealer malware, also known as 'LummaC2,' is now promoting a new feature that supposedly enables cybercriminals to revive [...]
The Kinsing malware operator is currently taking advantage of the critical CVE-2023-46604 vulnerability in the Apache ActiveMQ open-source message broker [...]
Another Russian state-sponsored hacking group, APT29, also known as UNC3524, NobleBaron, Dark Halo, NOBELIUM, Cozy Bear, CozyDuke, and SolarStorm, is [...]
Microsoft has made Windows 11 Moment 4 mandatory through the latest update (KB5032190) on Patch Tuesday. This update introduces features [...]
The WP Fastest Cache WordPress plugin, utilized by over a million sites to enhance page speed and user experience, is [...]
Malicious actors exploit Ethereum's 'Create2' function to evade wallet security alerts and compromise cryptocurrency addresses, resulting in a theft of [...]
A zero-day vulnerability in SysAid's service management software is being exploited by threat actors, identified as Lace Tempest (a.k.a. Fin11 [...]
The GootLoader malware has evolved with a new variant called GootBot, designed to enable lateral movement on compromised systems and [...]
The North Korean-backed group BlueNorOff, known for targeting cryptocurrency exchanges and financial institutions, is using new macOS malware called ObjCShellz [...]
Apple's "Find My" network, initially designed to help users locate lost Apple devices, can be exploited by malicious actors to [...]
Four zero-day vulnerabilities in Microsoft Exchange have been revealed, allowing remote attackers to execute arbitrary code and access sensitive data. [...]
A recently identified malware called 'KandyKorn' for macOS has emerged in a cyber campaign associated with the North Korean hacking [...]
Mozi, a prominent DDoS malware botnet that surfaced in 2019, predominantly attacking IoT devices, lost activity in August. Then, on [...]
Czech cybersecurity company, Avast, confirmed its antivirus SDK wrongly flagged a Google Android app as malware on Huawei, Vivo, and [...]
On October 25th, hackers stole $4.4 million in cryptocurrency using compromised LastPass databases to obtain private keys and passphrases. This [...]
Microsoft provided a fix for a known Microsoft 365 issue causing 'Something Went Wrong [1001]' sign-in errors and rendering desktop [...]
Pwn2Own Toronto 2023 ended with researchers earning $1,038,500 for 58 zero-day exploits targeting various consumer products from October 24 to [...]
StripedFly, a highly sophisticated cross-platform malware, went unnoticed by cybersecurity experts for five years, infecting over a million Windows and [...]
The Matrix open standard and real-time communication protocol team has launched version 2 with group VoIP encryption, faster loading times, [...]
1Password, a widely-used password manager for over 100,000 businesses, faced a security incident when hackers infiltrated its Okta ID management [...]
Google is preparing to test a "IP Protection" feature in Chrome, which hides users' IP addresses with proxy servers to [...]
A cyber threat actor is using fake LinkedIn posts and direct messages to trick people into downloading info-stealing malware, such [...]
The BlackCat/ALPHV ransomware operation recently incorporated a novel tool called 'Munchkin.' This tool harnesses virtual machines for surreptitious deployment of [...]
Amazon now offers passkey support for passwordless login, enhancing security by using biometrics or PINs linked to devices like phones [...]
Discord remains a hotspot for hackers, including APT groups, who use it to distribute malware, steal data, and target critical [...]
Between July and September, DarkGate malware attacks leveraged compromised Skype accounts to infect targets via messages with VBA loader script [...]
Hackers are exploiting LinkedIn Smart Links for phishing attacks to steal Microsoft account credentials. Smart Links are part of LinkedIn's [...]
A zero-day DDoS technique called 'HTTP/2 Rapid Reset' broke records in magnitude since August. Amazon, Cloudflare, and Google jointly reported [...]
Multiple Balada Injector campaigns have infected over 17,000 WordPress sites using known premium theme plugin vulnerabilities. Discovered in December 2022 [...]
The Chrome team is enhancing user experience with a new "Organize Tabs" feature, located at the top left corner, near [...]
Over the past six months, a complex malicious campaign has emerged, planting info-stealing packages on open-source platforms with 75,000 downloads. [...]
A recent Linux vulnerability, dubbed 'Looney Tunables' (CVE-2023-4911), allows local attackers to obtain root privileges by exploiting a buffer overflow [...]
'BunnyLoader' is a newly discovered fileless loader malware. It can steal clipboard contents, execute payloads, record keystrokes, steal data and [...]
The LostTrust ransomware operation is suspected to have rebranded from MetaEncryptor, employing nearly identical data leak sites and encryption methods. [...]
Hackers can exploit logic flaws in Cloudflare's Firewall and DDoS prevention, potentially undermining its protection. This poses a significant threat [...]