An overnight attack on the Solana blockchain platform drained thousands of software wallets of cryptocurrency worth millions of U.S. dollars. The platform has started an investigation...
Researchers have released details on a trio of cross-site scripting (XSS) vulnerabilities in popular open source apps that could lead to remote code execution (RCE). The security bugs,...
One of the primary methods used by malware distributors to infect devices is by deceiving people into downloading and running malicious files, and to achieve this...
From the infamous NotPetya campaign to the CCleaner backdoor, watershed infosec moments are not infrequent, but the SolarWinds supply chain attack stands out as particularly consequential. The so-called ‘Sunburst’ attack, which...
A security vulnerability in file transfer software CompleteFTP allowed unauthenticated attackers to delete arbitrary files on affected installations. Developed by EnterpriseDT of Australia, CompleteFTP is a proprietary FTP...
The provision for identifying “systemically important entities” included in the House-passed NDAA could still hitch a ride on the massive defense bill when it’s called to...
For industries without a heavy IT expertise, responding to the myriad vulnerability advisories released by the Cybersecurity and Infrastructure Security Agency is a daunting task. When...
An Australian man was charged for developing and selling the Imminent Monitor remote access trojan, used to spy on victims’ devices remotely. A remote access trojan...
Researchers have uncovered a gigantic network of more than 11,000 domains used to promote numerous fake investment schemes to users in Europe. The platforms show fabricated evidence...
Several adware apps promoted aggressively on Facebook as system cleaners and optimizers for Android devices are counting millions of installations on Google Play store. The apps lack...
Recent Comments