Security researchers discovered critical security driver vulnerabilities in Panda Security software. This chain of flaws abuses legitimate drivers to disable…
A new ransomware called “Kasseika” uses Bring Your Own Vulnerable Driver tactics to disable antivirus software before encrypting files. Kasseika…
The fest of vulnerabilities in enterprise software continues with an auth bypass flaw in Fortra’s GoAnywhere MFT. Rated at CVSS…
Researchers are seeing attempts to exploit a critical vulnerability in outdated Atlassian Confluence servers. The flaw allows attackers to execute…
CISA has given a timeframe of one to three weeks to fix three vulnerabilities related to Citrix NetScaler and Google…
Microsoft SmartScreen proved to be an effective way of approving…
The FBI’s Internet Fraud Complaint Center (IC3) has released its…
Mandiant experts noticed that North Korean hackers have focused their…
Mind-bending globe-scale events always attract a lot of attention. Newsmakers,…
Experts noticed that this week Emotet resumed its activity and…
Acronis, a Swiss-based information technology company that provides file recovery…
A proof-of-concept exploit for the CVE-2023-21716 vulnerability in a Microsoft…
Security researchers have noticed that by using text prompts embedded…
Companies tend to hide the case of a cybersecurity breach…
ESET experts reported that the BlackLotus UEFI bootkit, which is…
Cybercriminals periodically develop something new. Sometimes it is an updated…
LastPass, owned by GoTo (formerly LogMeIn) and with over 30…