Security

bg
SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs

SLAM Attack: New Spectre-based Vulnerability Impacts Intel,...

Researchers from the Vrije Universiteit Amsterdam have disclosed a new side-channel...

bg
Researchers Unveal GuLoader Malware's Latest Anti-Analysis Techniques

Researchers Unveal GuLoader Malware's Latest Anti-Analysis...

Threat hunters have unmasked the latest tricks adopted by a malware strain called GuLoader in...

bg
N. Korea's Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

N. Korea's Kimsuky Targeting South Korean Research Institutes...

The North Korean threat actor known as Kimsuky has been observed targeting research...

bg
New 5G Modem Flaws Affect iOS Devices and Android Models from Major Brands

New 5G Modem Flaws Affect iOS Devices and Android Models...

A collection of security flaws in the firmware implementation of 5G mobile network...

bg
N. Korean Kimsuky Targeting South Korean Research Institutes with Backdoor Attacks

N. Korean Kimsuky Targeting South Korean Research Institutes...

The North Korean threat actor known as Kimsuky has been observed targeting research...

bg
New 5G Modems Flaws Affect iOS Devices and Android Models from Major Brands

New 5G Modems Flaws Affect iOS Devices and Android Models...

A collection of security flaws in the firmware implementation of 5G mobile network...

bg
Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty in Money-Laundering Scheme

Founder of Bitzlato Cryptocurrency Exchange Pleads Guilty...

The Russian founder of the now-defunct Bitzlato cryptocurrency exchange has pleaded...

bg
Microsoft Warns of COLDRIVER's Evolving Evasion and Credential-Stealing Tactics

Microsoft Warns of COLDRIVER's Evolving Evasion and Credential-Stealing...

The threat actor known as COLDRIVER has continued to engage in credential theft...

bg
Mac Users Beware: New Trojan-Proxy Malware Spreading via Pirated Software

Mac Users Beware: New Trojan-Proxy Malware Spreading via...

Unauthorized websites distributing trojanized versions of cracked software have...

bg
WordPress Releases Update 6.4.2 to Address Critical Remote Attack Vulnerability

WordPress Releases Update 6.4.2 to Address Critical Remote...

WordPress has released version 6.4.2 with a patch for a critical security flaw that...

bg
Ransomware-as-a-Service: The Growing Threat You Can't Ignore

Ransomware-as-a-Service: The Growing Threat You Can't Ignore

Ransomware attacks have become a significant and pervasive threat in the ever-evolving...

bg
Microsoft Warns of COLDRIVER's Evolving Evading and Credential-Stealing Tactics

Microsoft Warns of COLDRIVER's Evolving Evading and Credential-Stealing...

The threat actor known as COLDRIVER has continued to engage in credential theft...

bg
New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms in Thailand

New Stealthy 'Krasue' Linux Trojan Targeting Telecom Firms...

A previously unknown Linux remote access trojan called Krasue has been observed...

bg
Meta Launches Default End-to-End Encryption for Chats and Calls on Messenger

Meta Launches Default End-to-End Encryption for Chats and...

Meta has officially begun to roll out support for end-to-end encryption (E2EE) in...

bg
Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'

Hacking the Human Mind: Exploiting Vulnerabilities in the...

Humans are complex beings with consciousness, emotions, and the capacity to act...

bg
Building a Robust Threat Intelligence with Wazuh

Building a Robust Threat Intelligence with Wazuh

Threat intelligence refers to gathering, processing, and analyzing cyber threats,...