The Have I Been Pwned data breach notification service now lets you check if your email and password are one of 441,000 accounts stolen in an...
Korean researchers have developed a set of attacks against some solid-state drives (SSDs) that could allow planting malware in a location that’s beyond the reach of...
The number of malicious dormant domains is on the rise, and as researchers warn, roughly 22.3% of strategically aged domains pose some form of danger. This was...
BlackTech cyber-espionage APT (advanced persistent threat) group has been spotted targeting Japanese companies using novel malware that researchers call ‘Flagpro’. The threat actor uses Flagpro in...
The RedLine information-stealing malware targets popular web browsers such as Chrome, Edge, and Opera, demonstrating why storing your passwords in browsers is a bad idea. This...
An Iranian cyber-security firm said it discovered a first-of-its-kind rootkit that hides inside the firmware of HP iLO devices and which has been used in real-world...
Samsung’s official Android app store, called the Galaxy Store, has had an infiltration of riskware apps that triggered multiple Play Protect warnings on people’s devices. As...
Researchers have discovered a stealthy malware campaign using valid code signing certificates in Windows systems to stay hidden. The malware loader, named Blister, further deploys second-stage...
The Dridex malware is active again and spreading via email campaigns by sending fake employee termination emails. The emails are used as bait to open a malicious Excel...
If that succeeds, it uses the actual app to perform fraudulent transactions by changing the user’s input fields. The actors have set up a page that...