"The Mask APT is a legendary threat actor that has been performing highly sophisticated attacks since at least 2007," ...
A security flaw has been disclosed in OpenWrt 's Attended Sysupgrade ( ASU ) feature that, if successfully exploited, could have been abused to distribute malicious firmware packages. The ...
CISA adds Adobe ColdFusion and Microsoft Windows flaws to exploited list; FBI warns of HiatusRAT targeting IoT devices.
Glutton malware by APT41 targets PHP systems globally, exploiting frameworks like Laravel and ThinkPHP, with unencrypted C2 ...
Malvertising campaign DeceptionAds exploited 3,000+ sites, delivering 1M+ daily impressions via fake CAPTCHA redirects, ...
Serbian police allegedly used Cellebrite and NoviSpy spyware to compromise a journalist's phone, exploiting a CVE-2024-43047 ...
Robust CI/CD governance ensures secure, compliant, and ethical pipelines for AI systems, balancing agility with transparency.
The malware has been codenamed IOCONTROL by OT cybersecurity company Claroty, highlighting its ability to attack IoT and ...
The Security Service of Ukraine (SBU or SSU) has exposed a novel espionage campaign suspected to be orchestrated by Russia's ...
Germany's BSI disrupts BADBOX malware targeting 30,000 devices, halting ad fraud, data theft, and proxy misuse.
Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door to a variety of attacks. The flaw, ...
DLL side-loading delivers Yokai backdoor targeting Thai officials, leveraging spear-phishing lures and persistent malware ...