Cybercriminals create hundreds of thousands of counterfeit domains that mimic well-known brands for financial gain. These fake domains serve multiple...
The latest news revealed a popular Google platform to scan malicious documents from Virustotal exposed to data breaches of its registered customers. At the end of...
The Ukrainian cyberpolice has uncovered a notorious criminal who operated bot farms, spread aggressive propaganda, and committed online fraud. A bot farm is a collective of...
Google released Chrome 115 to the stable channel for Windows, MacOS, and Linux on Tuesday, patching 20 vulnerabilities, including 11 that were discovered by external researchers. Four...
A Chinese-based state-sponsored espionage group, APT41 targets Android devices through spyware wyrmspy and Dragon egg which masquerades as legit applications. This group has been active since...
Researchers at Qualys discovered a new Remote Code Execution flaw in the OpenSSH. This flaw exists in OpenSSH’s forward ssh-agent. This flaw allows an attacker to...
Renowned former hacker Kevin Mitnick unexpectedly passed away on Sunday at the age of 59. After being identified over a year ago, it has been reported...
P2PInfect is a new P2P worm that is actively targeting the Redis servers on Linux and Windows OS, making it highly scalable and powerful compared to...
The Biden administration wants to use public feedback to shape baseline cybersecurity regulations that function across industries and sectors. Following the announcement of the White House’s implementation...
The power grid is experiencing heightened threats from foreign adversaries and domestic extremist groups that can pose devastating consequences for the nation’s supply of electricity, experts...
The agency has been granted new and important roles under the Biden administration’s plan to safeguard U.S. digital networks. The Department of Justice announced a new...
Recent Comments