Multiple Microsoft-themed phishing campaigns have been discovered that are using phony Google reCAPTCHA. In these, the attackers are looking for credentials of senior employees of various...
Three vulnerabilities found in the iSCSI subsystem of the Linux kernel could allow local attackers with basic user privileges to gain root privileges on unpatched Linux systems. These...
Google has fixed a second actively exploited Chrome zero-day this month with the release of Chrome 89.0.4389.90 to the Stable desktop channel for Windows, Mac, and Linux users. “Google is aware...
Threat actors have started to use ‘Promoted’ tweets, otherwise known as Twitter ads, to spread cryptocurrency giveaway scams. For some time, BleepingComputer has been reporting on...
Google has published JavaScript proof-of-concept (PoC) code to demonstrate the practicality of using Spectre exploits targeting web browsers to access information from a browser’s memory. According...
The operators of Lemon_Duck, a cryptomining botnet that targets enterprise networks, are now using Microsoft Exchange ProxyLogon exploits in attacks against unpatched servers. The malware is...
The marketplace was built as part of a recent Defense Department initiative aimed at advancing microelectronics technologies. IBM announced the establishment of a new marketplace inside...
Google has teamed up with the Linux community on a new project that aims to make open source software more secure through easy code signing and...
Today, OVH founder and chairman Octave Klaba has provided a plausible explanation for the fire that had burned down OVH data centers in Strasbourg, France. OVH is the...
An official version of the popular 7-zip archiving program has been released for Linux for the first time. Linux already had support for the 7-zip archive...