A new tactic, "ClickFix," has emerged. It exploits fake Google Meet and Zoom pages to deliver sophisticated malware. The Sekoia…
Google has released a batch of security updates addressing 40 vulnerabilities, two of which are critical zero-day exploits. As reported…
The threat actor known as IntelBroker, in collaboration with EnergyWeaponUser, has claimed responsibility for a significant data breach involving Nokia’s…
The Ukrainian Cyber Emergency Response Team discovered a targeted phishing campaign launched by UAC-0215 against critical Ukrainian infrastructure, including government…
The "You Dun" hacking group exploited vulnerable Zhiyuan OA software using SQL injection, leveraging tools like WebLogicScan, Vulmap, and Xray…
A newly discovered vulnerability in Okta's Device Access features for Windows could allow attackers to steal user passwords on compromised…
In its recent MediaTek Product Security Bulletin, the chipmaker disclosed two high-severity security vulnerabilities that affect multiple devices, including smartphones,…
A well-known dark web forum threat actor allegedly claimed responsibility for leaking data from Dell's enterprise partner portal. According to…
Diving into the world of cryptocurrencies, I've found it's a fascinating intersection of technology and economics. The crypto market isn't…
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits the popular social platform Discord…