According to Google's Mandiant threat intelligence division, threat actors are deploying new post-compromise implants in VMware's virtualization software to gain [...]
Several npm packages published by the decentralized exchange platform dYdX crypto exchange have been compromised. The compromised packages were published [...]
According to The Cybersecurity and Infrastructure Security Agency (CISA), the high severity Java deserialization vulnerability affecting multiple Zoho ManageEngine products [...]
According to Microsoft, state-sponsored hacking group DEV-0270 (also known as Nemesis Kitten) is actively abusing recently found vulnerabilities and uses [...]
According to Securonix security researchers, the recently discovered malware campaign GO#WEBBFUSCATOR spreads through phishing emails, malicious documents, and even James [...]
Chromium-based web browsers (including Chrome) allow websites to write anything they want into the user's clipboard without getting permission from [...]
The online tool InAppBrowser created by developer Felix Krause allows users to check if their in-app browsers inject privacy-threatening JavaScript [...]
Bitdefender cybersecurity researchers have discovered a big number of malicious Android apps on Google Play by employing a real-time behavior-based [...]
According to the Sentinel Labs researchers, LockBit ransomware operators have been abusing Microsoft Defender’s command line tool “MpCmdRun.exe” to side-load [...]