China's Volt Typhoon crew has resurfaced, using compromised legacy Cisco routers to infiltrate critical infrastructure, security experts report. This resurgence [...]
A new ransomware strain called 'Ymir' has emerged, encrypting systems already compromised by the RustyStealer malware. RustyStealer, known since 2021 [...]
Researchers have demonstrated that OpenAI's ChatGPT-4o, with its real-time voice API, could be exploited for autonomous scams, achieving success in [...]
Hackers are exploiting two zero-day vulnerabilities, CVE-2024-8956 and CVE-2024-8957, in PTZOptics pan-tilt-zoom cameras used widely in industries like healthcare, government, [...]
A zero-day vulnerability in Windows Themes enables attackers to steal NTLM credentials, exposing users to credential theft risks. Acros Security’s [...]
A cybersecurity researcher has released a tool named "Chrome-App-Bound-Encryption-Decryption" that bypasses Google Chrome's App-Bound encryption, allowing extraction of saved credentials [...]
A newly uncovered vulnerability in Windows allows attackers to bypass Driver Signature Enforcement (DSE) by downgrading Windows kernel components, enabling [...]
Attackers are exploiting exposed Docker Remote API servers to deploy perfctl cryptomining malware, according to Trend Micro researchers. Sunil Bharti [...]
The Lazarus hacking group, based in North Korea, exploited a Google Chrome zero-day vulnerability (CVE-2024-4947) using a fake decentralized finance [...]
Ivanti, an American IT software company, has released critical security updates addressing three new zero-day vulnerabilities in its Cloud Services [...]
Infostealer malware developers have updated their tools to claim they can bypass Google Chrome's App-Bound Encryption, which protects sensitive data [...]
A sprawling infostealer malware operation, led by the cybercriminal group "Marko Polo," has been uncovered. Thirty campaigns have targeted diverse [...]
The recently patched "Windows MSHTML spoofing vulnerability" (CVE-2024-43461) has been reclassified as previously exploited by the Void Banshee APT group. [...]
The RansomHub ransomware group has utilized TDSSKiller, a legitimate tool developed by Kaspersky, to deactivate endpoint detection and response (EDR) [...]
The Docker-OSX project, an open-source initiative by Sick.Codes, enabling macOS virtualization on non-Apple hardware, was recently removed from Docker Hub [...]
The Corona Mirai-based malware botnet exploits a 5-year-old zero-day in discontinued AVTECH IP cameras (CVE-2024-7029). This high-severity issue (CVSS v4 [...]