Security researchers have uncovered a malicious campaign that relies on a valid code-signing certificate to disguise malicious code as legitimate executables. One of the payloads that...
Apple has addressed a macOS vulnerability that unsigned and unnotarized script-based apps could exploit to bypass all macOS security protection mechanisms even on fully patched systems....
A subdomain takeover vulnerability in a popular WordPress hosting platform could allow an attacker to deploy malicious code to a victim by impersonating a legitimate website....
Vulnerabilities in wireless chip designs could allow malicious hackers to steal data and passwords from devices, according to security researchers. According to the group, from the Technical University...
Popular wrestling t-shirt site Pro Wrestling Tees has disclosed a data breach incident that has resulted in the compromise of the financial details of tens of...
VK is finally introducing two-factor authentication on all its services and plans to make it mandatory in February 2022 for administrators of large communities. VKontakte, or...
Albania’s prime minister has apologized for a large leak of personal records from a government database of state and private employees, which he said seems more...
There’s a fix for a critical flaw in Apache HTTP Server, the world’s second most widely used web server. The Apache Software Foundation has released an...
A researcher has found a dozen vulnerabilities in the myPRO product of Czech industrial automation company mySCADA, including several flaws that have been assigned a critical severity rating....
‘Up-and-coming’ ransomware strain is ramping up attacks. AvosLocker, a newcomer to the ransomware service scene, is ramping up attacks while using some new techniques to try...