A new report says a cyber threat actor within Russia’s military intelligence service leveraged a novel malware campaign targeting Android devices used by the Ukrainian military....
Despite recent improvements, a watchdog report claims the agency still has more it can do to make threat-sharing policies more effective. Though the Federal Deposit Insurance...
With the release of Mozilla Firefox 117, 13 vulnerabilities are patched, including seven ‘High Severity’ flaws and four memory corruption flaws. Mozilla said that IPC CanvasTranslator, IPC ColorPickerShownCallback, IPC FilePickerShownCallback, and...
According to recent reports, a number of vulnerabilities have been discovered in widely used ZIP libraries of Swift and Flutter. These packages are being utilized by...
Splunk has been reported with a Unauthenticated Log injection vulnerability in the Splunk IT Service Intelligence (ITSI) product. This vulnerability exists in Splunk ITSI versions prior to 4.13.3...
With the growing trend of businesses transitioning their operations to cloud-based Software as a Service (SaaS) platforms, ensuring the security of these systems has become of...
The FBI and the Justice Department have declared a global effort to disrupt and dismantle the Qakbot infrastructure, which is utilized in ransomware attacks. More than 700,000...
The Five Families unites the underground internet world, adopting the name of the 1950s-60s New York mafia’s Italian-American clans. This new group of “Five Families” involves...
Actors linked to adversarial nations — namely China and Russia — worked across platforms to push inaccurate content, according to a report released Tuesday. Social media...
The cybercrime group evaded remediation efforts by installing persistent backdoors and deploying “new and novel malware.” A Chinese-linked hacking group that security researchers say disproportionately targeted...
Recent Comments