KeePass has released version 2.54, fixing the CVE-2023-32784 vulnerability that allows the extraction of the cleartext master password from the...
A dropper has been discovered spreading via Google Play Store to deliver financial trojans. Dubbed Clast82, the dropper was found spreading AlienBot Banker and MRAT trojans...
A recent espionage campaign has been observed targeting organizations in the Middle East and neighboring regions. It shares the same target interest as the MuddyWater hacking...
Threat intelligence experts are warning of a new version of the Darkside ransomware variant which its creators claim will feature faster encryption speeds, VoIP calling and...
Multiple Microsoft-themed phishing campaigns have been discovered that are using phony Google reCAPTCHA. In these, the attackers are looking for credentials of senior employees of various...
UPDATED A newly launched regex-scanning tool has been used by its architects to unearth multiple regular expression denial-of-service (ReDoS) vulnerabilities in popular NPM, Python, and Ruby dependencies....
Get a start on a career in information technology, or enhance the skills you already have with this unlimited lifetime access to a complete tech skills library....
Three vulnerabilities found in the iSCSI subsystem of the Linux kernel could allow local attackers with basic user privileges to gain root privileges on unpatched Linux systems. These...
For the past two weeks, the cybersecurity news has been dominated by stories about the Microsoft Exchange ProxyLogon vulnerabilities. One overriding concern has been when will...
Google has fixed a second actively exploited Chrome zero-day this month with the release of Chrome 89.0.4389.90 to the Stable desktop channel for Windows, Mac, and Linux users. “Google is aware...
Threat actors have started to use ‘Promoted’ tweets, otherwise known as Twitter ads, to spread cryptocurrency giveaway scams. For some time, BleepingComputer has been reporting on...
Recent Comments