Weaponized Linux virtual machines are used for offensive cybersecurity purposes, such as "penetration testing" or "exploiting vulnerabilities." These setups often…
The HookBot malware family employs overlay attacks to trick users into revealing sensitive information by impersonating various brands and apps…
Recent discoveries by Binary Security have revealed critical vulnerabilities in Azure API Management (APIM) that could allow attackers with minimal privileges to…
Google has released a new update for its Chrome browser, addressing two high-severity vulnerabilities. The Stable channel has now been…
A new tactic, "ClickFix," has emerged. It exploits fake Google Meet and Zoom pages to deliver sophisticated malware. The Sekoia…
APT36, a sophisticated threat actor, has been actively targeting Indian entities with advanced malware like ElizaRAT, which is designed for…
Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to test an AV/EDR bypass tool were…
The Phish, 'n' Ships fraud operation leverages, compromised websites to redirect users to fake online stores, which, optimized for search…
Google has released a batch of security updates addressing 40 vulnerabilities, two of which are critical zero-day exploits. As reported…
The threat actor known as IntelBroker, in collaboration with EnergyWeaponUser, has claimed responsibility for a significant data breach involving Nokia’s…