Cybercriminals are encouraging users to send the “offers” via WhatsApp to their friends as well. Malicious Android apps disguised as TikTok and offers for free Lenovo...
The database was subsequently leaked elsewhere, imperiling consumers from the U.S. and around the world. The Swarmshop cyber-underground “card shop” has been hit by hackers, who...
Researchers found a number of privacy and security issues in Amazon’s Alexa skill vetting process, which could lead to attackers stealing data or launching phishing attacks....
RIPE NCC, the regional Internet registry for Europe, West Asia, and the former Soviet Union, said attackers attempted a credential-stuffing attack against its single-sign on service....
An CRSF-to-stored-XSS security bug plagues 50,000 ‘Contact Form 7’ Style users. A security bug in Contact Form 7 Style, a WordPress plugin installed on over 50,000...
A savvy phishing campaign manages to evade native Microsoft security defenses, looking to steal O365 credentials. A phishing campaign bent on stealing Microsoft login credentials is...
The Pro-Ocean cryptojacking malware now comes with the ability to spread like a worm, as well as harboring new detection-evasion tactics. Researchers have identified an updated...
The CursedGrabber malware has infiltrated the open-source software code repository. Three malicious software packages have been published to npm, a code repository for JavaScript developers to...
Retailers are on high alert during holiday season of Magecart attacks, which implant malicious computer code into websites and third-party suppliers of digital systems to steal...
Desktop versions of the browser received a total of eight fixes, half rated high-severity. Google has updated its Chrome web browser, fixing four bugs with a...
Recent Comments