A security researcher discovered a vulnerability in Windows theme files in the previous year, which allowed malicious actors to steal…
The ongoing Meta malvertising campaign, active for over a month, employs an evolving strategy to distribute the SYS01 InfoStealer through…
The researchers have observed consistent efforts by Russia, Iran, and China to exert foreign influence on democratic processes in the…
The "You Dun" hacking group exploited vulnerable Zhiyuan OA software using SQL injection, leveraging tools like WebLogicScan, Vulmap, and Xray…
Researchers discovered a Russian-linked threat actor, UNC5812, utilizing a Telegram persona named "Civil Defense. " This persona has been distributing…
In July 2024, the ransomware group Embargo targeted US companies using the malicious loader MDeployer and EDR killer MS4Killer. MDeployer…
Singapore’s government has instructed internet service providers to block access to websites deemed “inauthentic,” which are believed to be part…
The attackers use a multi-stage attack, starting with a malicious LNK file disguised as a healthcare-related document. This file, likely…
A newly discovered vulnerability in Okta's Device Access features for Windows could allow attackers to steal user passwords on compromised…
In its recent MediaTek Product Security Bulletin, the chipmaker disclosed two high-severity security vulnerabilities that affect multiple devices, including smartphones,…