A newly discovered vulnerability in OpenSSH nicknamed regreSSHion allows remote attackers to gain root privileges on Linux systems based on…
Instagram hacking scams is an old-new direction of online fraud that targets people who want to get into someone’s accounts…
A new malicious code execution technique, coined GrimResource, was discovered, targeting Microsoft Management Console. Attackers are exploiting an old cross-site…
Cybercriminals appear to exploit Binance smart contracts as intermediary C2, preferring them over more classic hostings for them being impossible…
On June 20, 2024, the Biden administration implemented a complete ban on sales of Kaspersky software. The company has been…
Citrix was able to patch a zero-day vulnerability, while Adobe…
Threat actors reportedly started using fake TeamViewer to distribute malware.…
An employee of the Google-owned platform VirusTotal accidentally uploaded a…
SlashNext noticed that cybercriminals are increasingly using generative AI in…
Email letters sent to the US military addresses ended up…
In June, researchers revealed a vulnerability in Azure Active Directory…
American Airlines, the major airline company in the US, appears…
Windows Defender’s mass detections of Trojan:Win32/Randet.A!plock worries people. Are the…
On July 11, 2023, Microsoft published an article about addressing…
The source code for the BlackLotus UEFI bootkit, which was…
Cryptocurrency is a rapidly changing world where people can make…
Hackers actively use driver signature spoofing, which originates from a…