Multiple Information Disclosure vulnerabilities were discovered in the IBM Security Verify Information Queue, which can reveal several internal product details. This information...
The North Korea-affiliated group Kimsuky’s email attacks targeted research and media organizations. A bilateral coalition of security agencies issued a new cybersecurity advisory on Friday morning,...
A spyware-enabled Android app module that can gather details about files kept on devices and send them to attackers. Additionally, clipboard contents can be replaced and...
The recent discovery of a critical vulnerability in the NPU chipset by Tsinghua University and George Mason University researchers allows attackers to eavesdrop on data transmitted over 89%...
The AhnLab Security Emergency Response Center (ASEC) confirmed recent attacks on Windows IIS web servers by the nationally supported Lazarus group. Typically, threat actors exploit vulnerable...
Offensive Security launched Kali Linux 2023.2, an updated Penetration testing distro with new features, hacking tools, and various updates. The Offensive Security team consistently releases new versions of...
DogeRAT (Remote Access Trojan) is an open-source Android malware that targets a sizable customer base from various businesses, particularly banking, and entertainment. CloudSEK’s TRIAD team detected it. Although this...
For Windows, Mac, and Linux, Google has released Chrome 114 to the stable channel. The next few days/weeks will see the implementation of this. According to the...
In May 2023, Huntress ThreatOps Center analysts detected a cryptocurrency miner (XMRig) on an endpoint, identified the miner’s associated site and wallet address by locating the...
The FBI and Homeland Security are emphasizing the need to digitally safeguard tech R&D in the U.S. from state-sponsored adversaries. Protecting American intellectual property in the...
In collaboration with international and private sector partners, CISA released a new advisory warning network defenders of PRC-linked Volt Typhoon’s infiltration tactics. Federal agencies added another...
Recent Comments