Critical vulnerabilities in LocalStack, a popular framework for building cloud applications, can be chained to remotely take over locally-run LocalStack instances, security researchers claim. Researchers from...
The word “hacking” tends to have a negative connotation, but in actuality, hacking can also be used for good: such as “ethical hacking.” Ethical hacking is about...
Microsoft has addressed a known issue causing memory or disk space errors when opening some documents using Microsoft Word, Microsoft Excel, or other Microsoft Office apps....
A new online service allows security researchers to search for exposed shortened URLs, known for their risks to security and privacy. Shortened URLs are comparatively easy to brute-force,...
While cyberattacks targeting large corporations or government agencies tend to make splashy headlines, the truth is that many attackers are shifting their priorities to focus on...
Since the recent boom in the prices of cryptocurrencies, cybercriminals are continuously targeting cryptocurrency platforms and exchanges, using a wide variety of attack tactics. Bitdefender Antispam...
Attackers often keep upgrading their tools to scan for and infect new devices by exploiting unpatched vulnerabilities. Recently, the z0Miner cryptomining malware was spotted probing cloud...
Three recently unearthed vulnerabilities in the Linux kernel, located in the iSCSI module used for accessing shared data storage facilities, could allow root privileges to anyone...
The threat group behind the Sodinokibi ransomware claimed to have recently compromised nine organizations. The REvil ransomware threat group is on a cyberattack tear, claiming over...
A Utah company has exposed the sensitive information of more than 50,000 customers by storing data on an unsecured server. The breach at Premier Diagnostics was discovered on...