Several threat actors have already been exploiting a newly discovered Android banking trojan, dubbed Nexus, to penetrate 450 financial applications and steal data. While this malware...
The malware analysis tools simply allow us to know in a quick and effective way, what actions a threat makes in the system. In this way, you can...
At Pwn2Own Vancouver 2023 Day 2, for 10 unique zero-day exploits, the participants received $475,000 of cash prizes. The Tesla Model 3, the Microsoft Teams communication platform, the...
Enhancing collaboration and information sharing with industry partners can help mitigate threats, but concerns remain about the extent to which foreign-made equipment is embedded within the...
As part of its ongoing efforts to protect Microsoft cloud environments against malicious activity, CISA recently introduced an open-source incident response tool called the “Untitled Goose...
Fresh produce giant Dole Food Company has confirmed threat actors behind a February ransomware attack have accessed the information of an undisclosed number of employees. Dole...
A new credit card stealing hacking campaign is doing things differently than we have seen in the past by hiding their malicious code inside the ‘Authorize.net’...
On the first day of Pwn2Own Vancouver 2023, security researchers successfully demoed Tesla Model 3, Windows 11, and macOS zero-day exploits and exploit chains to win...
Recently, the renowned manufacturer of sports cars Company “Ferrari” from Italy reported that a ransomware attack targeted their IT systems and accessed or stole sensitive data. ...
The bipartisan package of two bills would address the government’s shortage of skilled cyber personnel by allowing DOD and DHS “to recruit qualified civilian cybersecurity personnel...
Recent Comments