Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't...
Apr 01, 2024NewsroomBotnet / Mobile Security
Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other...
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniques, enabling...
Mar 30, 2024NewsroomMalware / Cryptocurrency
Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware, including Atomic Stealer,...
Mar 30, 2024NewsroomLinux / Supply Chain Attack
RedHat on Friday released an "urgent security alert" warning that two versions of a popular data compression...
Mar 29, 2024NewsroomReverse Engineering / RFID Security
Security vulnerabilities discovered in Dormakaba's Saflok electronic RFID locks used in hotels could be weaponized by threat...
Mar 29, 2024NewsroomNetwork Security / IoT Security
A botnet previously considered to be rendered inert has been observed enslaving end-of-life (EoL) small home/small office...
Mar 29, 2024The Hacker NewsPen Testing / Regulatory Compliance
Network penetration testing plays a vital role in detecting vulnerabilities that can be exploited. The...
Mar 29, 2024NewsroomVulnerability / Linux
Details have emerged about a vulnerability impacting the "wall" command of the util-linux package that could be potentially exploited...