Threat actors have been seen to abuse Windows zero-day which allows malicious JavaScript Files to bypass Mark-of-the-Web security warnings. Mark-of-the-Web [...]
According to security researchers, hackers are still exploiting the critical VMware vulnerability (CVE-2022-22954) that allows them to drop various malware [...]
Ducktail phishing campaign, linked to Vietnamese hackers, is actively stealing Facebook accounts, cryptocurrency wallets, and browser data using new PHP [...]
According to security researchers, IcedID creators have been improving and diversifying the delivery tactics of their phishing campaigns. IcedID is [...]
According to Google's Mandiant threat intelligence division, threat actors are deploying new post-compromise implants in VMware's virtualization software to gain [...]
Several npm packages published by the decentralized exchange platform dYdX crypto exchange have been compromised. The compromised packages were published [...]
According to The Cybersecurity and Infrastructure Security Agency (CISA), the high severity Java deserialization vulnerability affecting multiple Zoho ManageEngine products [...]
According to Microsoft, state-sponsored hacking group DEV-0270 (also known as Nemesis Kitten) is actively abusing recently found vulnerabilities and uses [...]
According to Securonix security researchers, the recently discovered malware campaign GO#WEBBFUSCATOR spreads through phishing emails, malicious documents, and even James [...]