There is a concerning trend among cybercriminals targeting individuals working with the .NET framework using a sneaky tactic called typosquatting. This involves creating fake packages that...
Significant numbers of cyberattacks are executed in a political or geopolitical context that Kaspersky researchers and the international community are identifying. In recent weeks, reports have surfaced of...
A severe flaw recently affecting ChatGPT, an artificial intelligence chatbot developed by OpenAI, exposed chat history and consequently caused an outage. After observing Chinese characters in...
Threats enacted by state-sponsored actors during the 2022 election have highlighted the need for “continued vigilance” in upcoming elections, said CISA Election Security Advisor Kim Wyman....
Security is a multifaceted field with multiple roles for carrying out diverse operations. In this article, we demystify the concept of the red and blue teams...
General Bytes, a Prague-based company, announced on 18 March that it had received a hacker warning saying it had remotely uploaded a Java application to its...
A joint operation conducted by DHS, FCEB, and CISA Identified multiple attempts of a cyber attack on the U.S. Government IIS Server by exploiting a .NET deserialization...
The agency tasked with supervising financial institutions nationwide is struggling to maintain effective information security measures, according to a new inspector general report. The Federal Deposit...
Cybersecurity analysts at ESET recently identified several fraudulent websites mimicking the popular messaging apps, Telegram and WhatsApp. While these fake websites are primarily targeted at the...
The Project Zero team at Google has recently found and reported 18 zero-day vulnerabilities in Samsung’s Exynos chipsets, which are mainly used in:- Among the 18 zero-day...