Aug 30, 2024Ravie LakshmananMalware / Network Security Cybersecurity researchers have disclosed a new campaign that potentially targets users in the Middle East through...
The most dangerous vulnerability you’ve never heard of.
In the world of cybersecurity, vulnerabilities are discovered so often, and at such a high rate,...
Aug 30, 2024The Hacker NewsICS Security / OT Security
A comprehensive guide authored by Dean Parsons emphasizes the growing need for specialized ICS security...
Aug 30, 2024Ravie LakshmananCryptocurrency / Malware
Threat actors with ties to North Korea have been observed publishing a set of malicious packages to the...
Aug 29, 2024Ravie LakshmananBrowser Security / Vulnerability
Cybersecurity researchers have flagged multiple in-the-wild exploit campaigns that leveraged now-patched flaws in Apple Safari and Google...
Aug 29, 2024Ravie LakshmananCyber Espionage / Malware
A non-profit supporting Vietnamese human rights has been the target of a multi-year campaign designed to deliver...
Aug 29, 2024Ravie LakshmananIoT Security / Vulnerability
A years-old high-severity flaw impacting AVTECH IP cameras has been weaponized by malicious actors as a zero-day...
Attackers are increasingly using new phishing toolkits (open-source, commercial, and criminal) to execute adversary-in-the-middle (AitM) attacks.
AitM enables attackers to not just harvest credentials...
U.S. cybersecurity and intelligence agencies have called out an Iranian hacking group for breaching multiple organizations across the country and coordinating with affiliates...