A new security update released by Apple addresses recent zero-day (CVE-2022-42827) that affects iPhones and iPads and was used in [...]
Category: News
Apple's new security advisory states that the ninth zero-day used in attacks against iPhones since the start of the year [...]
Threat actors have been seen to abuse Windows zero-day which allows malicious JavaScript Files to bypass Mark-of-the-Web security warnings. Mark-of-the-Web [...]
According to security researchers, hackers are still exploiting the critical VMware vulnerability (CVE-2022-22954) that allows them to drop various malware [...]
The latest Firefox version brought a new feature that allows the convenient editing of PDF files. The feature allows users [...]
The threat actor is supposedly selling a brand new UEFI bootKit named BlackLotus on hacking forums, which is commonly linked [...]
Ducktail phishing campaign, linked to Vietnamese hackers, is actively stealing Facebook accounts, cryptocurrency wallets, and browser data using new PHP [...]
The Dutch National Police, in collaboration with cybersecurity firm Responders.NU got 155 decryption keys from the DeadBolt ransomware gang by [...]
An unofficial Android version of WhatsApp called 'YoWhatsApp' has been discovered to steal access keys for users' accounts. YoWhatsApp has [...]
According to security researchers, IcedID creators have been improving and diversifying the delivery tactics of their phishing campaigns. IcedID is [...]
Last Friday an anonymous Twitter account by the nickname 'freak' posted links that led to Intel's 12th generation processor (known [...]
Microsoft has confirmed a known issue that causes performance reduction when copying large files over SMB after installing the Windows [...]
Eternity Project is a marketplace where threat actors can buy various malicious software for their own use, including miners, stealers, [...]
According to security researchers, a large number of Microsoft SQL servers are currently targeted by the new backdoor called Maggie. [...]
Threat actors have been abusing two Microsoft Exchange zero-days in order to breach its servers and remotely execute the malicious [...]
Windows uses File Explorer to work with files, but its functionality is limited, for example, it doesn't allow users to [...]
North Korean hacking group Lazarus has been using a Windows rootkit called FudModule to abuse a Dell driver vulnerability in [...]
According to Google's Mandiant threat intelligence division, threat actors are deploying new post-compromise implants in VMware's virtualization software to gain [...]
A new malware dropper NullMixer has been discovered to infect Windows devices with a large variety of malware families, including [...]
Security researchers have found 75 adware apps on Google Play and 10 on Apple's App Store, adding to 13 million [...]
One of the new features coming with Windows 11 22H2 is a security feature called Enhanced Phishing Protection. The feature's [...]
Several npm packages published by the decentralized exchange platform dYdX crypto exchange have been compromised. The compromised packages were published [...]
According to The Cybersecurity and Infrastructure Security Agency (CISA), the high severity Java deserialization vulnerability affecting multiple Zoho ManageEngine products [...]
According to VMware and Microsoft, an ongoing widespread Chromeloader malware campaign was seen to drop malicious browser extensions and even [...]
GTA 6 source code and gameplay videos have been leaked to GTAForums by the threat actor ‘teapotuberhacker’. The RAR archive [...]
Romanian cybersecurity company Bitdefender has released a free decryptor for LockerGoga ransomware that victims can use to decrypt their files [...]
The new security advisory has been issued by Apple on Monday in which the company addressed the eighth zero-day vulnerability [...]
More and more ransomware gangs are employing the new tactic called intermittent encryption which allows faster encryption and fewer chances [...]
According to Microsoft, state-sponsored hacking group DEV-0270 (also known as Nemesis Kitten) is actively abusing recently found vulnerabilities and uses [...]
The operation CodeRAT originates from Iran and mostly targets Farsi-speaking software devs with Word documents that include a DDE exploit. [...]
In the new Chrome version 105.0.5195.102 Google has addressed a high severity vulnerability that was actively exploited in the wild. [...]
According to Chile's national computer security and incident response team (CSIRT) the ransomware attack that started on August 25 has [...]
According to Securonix security researchers, the recently discovered malware campaign GO#WEBBFUSCATOR spreads through phishing emails, malicious documents, and even James [...]
According to Check Point's report, malware by the developer 'Nitrokod' delays its installation for a month to avoid being detected [...]
Chromium-based web browsers (including Chrome) allow websites to write anything they want into the user's clipboard without getting permission from [...]
New malware dubbed 'MagicWeb' from the Russian state-sponsored hacking group APT29 (also known as Nobelium, Cozy Bear) has been discovered [...]
Password management company LastPass was hacked two weeks ago, allowing hackers to steal source code and technical information. According to [...]
Chrome extension 'Internet Download Manager' has reached 200,000 installs on Chrome Web Store, while sitting on the store since June [...]
Hackers have managed to abuse the zero-day vulnerability in General Bytes Bitcoin ATM servers to steal the cryptocurrency from the [...]
The online tool InAppBrowser created by developer Felix Krause allows users to check if their in-app browsers inject privacy-threatening JavaScript [...]