Three fake Chrome VPN extensions, disguised as legitimate tools, were downloaded 1.5 million times. These malicious extensions, discovered by ReasonLabs, [...]
Microsoft has identified APT33, an Iranian cyber-espionage group also known as Peach Sandstorm, HOLMIUM, or Refined Kitten, employing the recently [...]
Academic researchers unveiled SLAM, a novel side-channel attack exploiting security-enhancing hardware features in upcoming Intel, AMD, and Arm CPUs. SLAM, [...]
LogoFAIL is a set of security vulnerabilities impacting image-parsing components within UEFI code across different vendors. These vulnerabilities pose a [...]
Google released security updates for Chrome, addressing seven issues, including a high-severity zero-day vulnerability (CVE-2023-6345) in the Skia 2D graphics [...]
A newly identified Mirai-based malware botnet named 'InfectedSlurs' is leveraging two zero-day remote code execution (RCE) vulnerabilities to infect routers [...]
The Kinsing malware operator is currently taking advantage of the critical CVE-2023-46604 vulnerability in the Apache ActiveMQ open-source message broker [...]
Another Russian state-sponsored hacking group, APT29, also known as UNC3524, NobleBaron, Dark Halo, NOBELIUM, Cozy Bear, CozyDuke, and SolarStorm, is [...]
Malicious actors exploit Ethereum's 'Create2' function to evade wallet security alerts and compromise cryptocurrency addresses, resulting in a theft of [...]
The North Korean-backed group BlueNorOff, known for targeting cryptocurrency exchanges and financial institutions, is using new macOS malware called ObjCShellz [...]
Four zero-day vulnerabilities in Microsoft Exchange have been revealed, allowing remote attackers to execute arbitrary code and access sensitive data. [...]
StripedFly, a highly sophisticated cross-platform malware, went unnoticed by cybersecurity experts for five years, infecting over a million Windows and [...]
The BlackCat/ALPHV ransomware operation recently incorporated a novel tool called 'Munchkin.' This tool harnesses virtual machines for surreptitious deployment of [...]