Codecov's Bash Uploader script got modified by a threat actor, according to the company's investigation, exposing sensitive information in customers' [...]
HackBoss is a cryptocurrency stealing malware distributed via Telegram channel HackBoss, which promises users hacking and cracking applications. Hackers spread [...]
Security researcher Rajvardhan Agarwal released a working proof-of-concept (PoC) exploit for a remote code execution vulnerability for the V8 JavaScript [...]
Zoom Zero-day vulnerability has been disclosed by security researchers during the Pwn2Own contest, which is a contest for cybersecurity professionals [...]
Gigaset is a German manufacturer of telecommunications devices, including a series of smartphones running the Android operating system. Starting on [...]
The vulnerability tracked as CVE-2021-1879 was discovered in the Webkit browser engine and allowed hackers to launch cross-site scripting attacks. [...]
Regular cyberattacks introduce JavaScript into the website to redirect users to malicious sites, exploit vulnerabilities, and steal user's submitted data, [...]
Google's zero-day bug-hunting team Project Zero reports that the hacking group launched several campaigns targeting Windows, iOS, Android throughout 2020, [...]
The Cybersecurity and Infrastructure Security Agency (CISA) has created a new tool to detect SolarWinds malicious activity in enterprise environments. [...]
Recently Microsoft has disclosed four vulnerabilities that are actively used together in attacks against Microsoft Exchange. Those vulnerabilities are now [...]
The operators of Lemon_Duck, a cryptomining botnet targeting enterprise networks, are now using Microsoft Exchange Proxylogon exploits in their attacks. [...]