Apr 03, 2024NewsroomWeb Security / Vulnerability
A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to extract sensitive information from...
Apr 02, 2024NewsroomFirmware Security / Vulnerability
The malicious code inserted into the open-source library XZ Utils, a widely used package present in major Linux...
Apr 02, 2024NewsroomCyber Espionage / Threat Intelligence
A threat activity cluster tracked as Earth Freybug has been observed using a new malware called UNAPIMON...
Apr 02, 2024NewsroomBrowser Security / Data Security
Google has agreed to purge billions of data records reflecting users' browsing activities to settle a class...
Apr 02, 2024NewsroomMalvertising / Threat Intelligence
The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a...
Apr 01, 2024NewsroomCryptocurrency / Financial Fraud
The Indian government said it has rescued and repatriated about 250 citizens in Cambodia who were held captive...
Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued threats aren't...
Apr 01, 2024NewsroomBotnet / Mobile Security
Several malicious Android apps that turn mobile devices running the operating system into residential proxies (RESIPs) for other...