Security

bg
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail

Cyber Criminals Exploit GitHub and FileZilla to Deliver...

A "multi-faceted campaign" has been observed abusing legitimate services like GitHub...

bg
Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel

Iranian MOIS-Linked Hackers Behind Destructive Attacks...

An Iranian threat actor affiliated with the Ministry of Intelligence and Security...

bg
Cyber Criminals Exploit GitHub and FileZilla to Deliver Cocktail Malware

Cyber Criminals Exploit GitHub and FileZilla to Deliver...

A "multi-faceted campaign" has been observed abusing legitimate services like GitHub...

bg
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks

Defending Your Commits From Known CVEs With GitGuardian...

All developers want to create secure and dependable software. They should feel proud...

bg
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal

Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse...

Multiple threat actors are weaponizing a design flaw in Foxit PDF Reader to deliver...

bg
Latrodectus Malware Loader Emerges as IcedID's Successor in Phishing Campaigns

Latrodectus Malware Loader Emerges as IcedID's Successor...

Cybersecurity researchers have observed a spike in email phishing campaigns starting...

bg
Chinese Nationals Arrested for Laundering $73 Million in Pig Butchering Crypto Scam

Chinese Nationals Arrested for Laundering $73 Million in...

The U.S. Department of Justice (DoJ) has charged two arrested Chinese nationals...

bg
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide

Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500...

The threat actors behind the Windows-based Grandoreiro banking trojan have returned...

bg
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking

Kinsing Hacker Group Exploits More Flaws to Expand Botnet...

The cryptojacking group known as Kinsing has demonstrated its ability to continuously...

bg
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT

China-Linked Hackers Adopt Two-Stage Infection Tactic to...

Cybersecurity researchers have shed more light on a remote access trojan (RAT) known...

bg
New XM Cyber Research: 80% of Exposures from Misconfigurations, Less Than 1% from CVEs

New XM Cyber Research: 80% of Exposures from Misconfigurations,...

A new report from XM Cyber has found – among other insights - a dramatic gap between...

bg
CISA Warns of Actively Exploited D-Link Router Vulnerabilities - Patch Now

CISA Warns of Actively Exploited D-Link Router Vulnerabilities...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two...

bg
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks

Kimsuky APT Deploying Linux Backdoor Gomir in South Korean...

The Kimsuky (aka Springtail) advanced persistent threat (APT) group, which is linked...

bg
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks

New Wi-Fi Vulnerability Enables Network Eavesdropping via...

Researchers have discovered a new security vulnerability stemming from a design...

bg
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign

North Korean Hackers Exploit Facebook Messenger in Targeted...

The North Korea-linked Kimsuky hacking group has been attributed to a new social...

bg
Researchers Uncover 11 Security Flaws in GE HealthCare Ultrasound Machines

Researchers Uncover 11 Security Flaws in GE HealthCare...

Security researchers have disclosed almost a dozen security flaws impacting the...