Uncovering a New Bluetooth Vulnerability: Threats to iOS, Linux, macOS, and Android Devices

In the realm of cybersecurity, a significant concern has emerged as threat…

iPhone Users Beware: Sneaky Attack Utilizing a Fake Lockdown Mode

Security experts have recently uncovered a sophisticated…

BLUFFS Bluetooth Attack is Putting Devices at Risk

Recent investigations have brought to light a series of sophisticated attacks…

Google’s New Defense Against Spam and Malicious Emails

With the intention of assisting in the identification of potentially hazardous…

North Korea’s Lazarus Group has made $3 billion out of cryptocurrency hacks.

Since at least 2017, threat actors from the Democratic People’s Republic…

The Methods Cybercriminals Use to Get Your Users’ Passwords and Then Sell Them

The value of account credentials has increased in the cybercrime market since…

Uncovering a Passive Approach to Extracting Private RSA Keys from SSH Tunnels

A recent study has shed light on the potential for passive network attackers to…

Emails with a shipping theme are being used to spread a new WailingCrab malware loader.

Cybercriminals are employing email messages centred around delivery and…

North Korean hackers pose as recruiters and job seekers.

Threat actors from North Korea have been linked to two campaigns. In these…

NetSupport RAT targets both the business and government sectors

A remote access trojan, known as NetSupport RAT, is actively being used by…

Play Ransomware Is being Provided as a Service to Cybercriminals

The Play ransomware strain has transformed into a lucrative business model,…

CISA Issue a Public Alert Regarding Rhysida Ransomware

The threat actors behind the Rhysida ransomware conduct opportunistic attacks…

Unveiling a New Ransomware Group: Leveraging Hive’s Source Code and Infrastructure

To propel their initiatives in the threat landscape, the threat actors…

A DDoS botnet OracleIV is targeting public Docker Engine APIs

Publicly accessible instances of the Docker Engine API are currently under…

A new Intel CPU vulnerability affects multi-tenant virtualized environments

Intel has swiftly responded to the critical Reptar vulnerability, extending its…

CISA has issued a warning that a high-severity SLP vulnerability is now being actively exploited.

On Wednesday, the United States Cybersecurity and Infrastructure Security…

Deceptive Tactics through a Fake Windows News Portal

Recent findings reveal a novel malvertising strategy employing counterfeit…

A new type of GootLoader malware is hard to catch and spreads quickly.

Researchers have discovered that non-privileged attackers are exploiting as…

Google’s Security Measures Fall Short Against SecuriDropper

Cybersecurity experts have discovered a new Android Dropper-as-a-Service (DaaS)…

Researchers Uncover Vulnerabilities in 34 Windows Drivers

Researchers have discovered that non-privileged attackers are exploiting as…

F5 warns of active attacks that take advantage of a BIG-IP vulnerability

F5 is alerting the public about an active misuse of a critical security…

Infected NuGet Packages Unearthed Distributing the SeroXen Remote Administration Tool

Within the realm of information security, diligent researchers have unveiled a…

Hackers Infecting Windows PCs with GHOSTPULSE via MSIX App Packages

A recently unveiled cyber assault campaign has uncovered a new threat in the…

VMware Releases Critical Patch for Remote Code Execution Vulnerability in vCenter Server

VMware has taken swift action to address a critical vulnerability in the…

Critical Flaws Discovered in OAuth Platforms: Grammarly, Vidio, and Bukalapak

The Open Authorization (OAuth) implementation in well-known web services, such…

Cisco’s Discovery: A Second Zero-Day Vulnerability Despite the Decline in Hacked Devices

Cisco, a cybersecurity industry leader, recently brought a troubling revelation…

Real-Time Code-Level Scanning is Now Available for Android Malware Thanks to Google Play Protect

An update to Google’s Play Protect has been released, and the company has…

Lazarus Group Is Going After Defense Experts Using Bogus Interviews Conducted Through Trojanized VNC Apps.

As part of a long-running campaign known as Operation Dream Job, the Lazarus…

Be Cautious of SpyNote, an Android Trojan That Records Both Audio and Phone Calls

The Android banking trojan known as SpyNote has been deconstructed, revealing…

Pro-Russian Hackers Exploiting New WinRAR Vulnerability in Phishing Campaign

In a targeted phishing campaign designed to extract sensitive credentials from…

Cisco Issues Urgent Patch to Address Critical Flaw in Emergency Responder Systems

Cisco has swiftly taken action to mitigate a significant security vulnerability…

BMC Firmware in Supermicro Reveals Multiple Critical Vulnerabilities

Recently, it was uncovered that Supermicro’s BMC firmware harbours…