ExaTrack found a new undetected implant family called Mélofée that targets Linux systems. Three samples of the previously known malicious software, dating from the beginning of...
Uptycs threat research team recently discovered “MacStealer,” a new information-stealing malware designed to target Apple’s macOS operating system. It aims to steal various sensitive information, including...
Europol Innovation Lab recently conducted workshops with experts from Europol to investigate the potential for criminal abuse of language models like ChatGPT and their usefulness for...
Twitter has taken down internal source code for its platform and tools that was leaked on GitHub for months. Now it’s using a subpoena to search for...
Pwn2Own Vancouver 2023 has ended with contestants earning $1,035,000 and a Tesla Model 3 car for 27 zero-day (and several bug collisions) exploited between March 22...
Businesses rely on their end-users, but those same users often don’t follow the best security practices. Without the right password security policies, a single end-user password...
A new North Korean hacking group has been revealed to be targeting government organizations, academics, and think tanks in the United States, Europe, Japan, and South...
Crown Resorts, Australia’s largest gambling and entertainment company, has confirmed that it suffered a data breach after its GoAnywhere secure file-sharing server was breached using a...
Several security vulnerabilities were recently addressed by Canonical in both Graphviz and the Linux kernel of Ubuntu. Recent discoveries include null pointer dereference vulnerabilities in Graphviz...
Researchers recently conducted an investigation and uncovered alarming information regarding 13 Facebook pages and accounts. These pages and profiles have been compromised by the threat actors,...