BlackLotus is the first bootkit bypassing UEFI Secure Boot on Windows 11
ESET discovered a stealthy Unified Extensible Firmware Interface (UEFI) bootkit dubbed BlackLotus that is able to bypass the Secure Boot...
Category Added in a WPeMatico Campaign
ESET discovered a stealthy Unified Extensible Firmware Interface (UEFI) bootkit dubbed BlackLotus that is able to bypass the Secure Boot...
Who has been warning Italian criminals that their phones are wiretapped? Can you trust your voice to protect your bank...
Satellite TV giant Dish Network has confirmed that the recent outage was caused by a ransomware attack, it also disclosed...
Experts warn of a new wave of attacks against cryptocurrency entities, threat actors are using a RAT dubbed Parallax RAT...
Fooling a Voice Authentication System with an AI-Generated Voice A reporter used an AI synthesis of his own voice to...
Gmail client-side encryption (CSE) is now available for Workspace Enterprise Plus, Education Plus, and Education Standard customers. Google announced that...
Antivirus company Bitdefender has released a free decryptor for the recently discovered ransomware family MortalKombat. Good news for the victims of the...
The U.S. Marshals Service (USMS) was the victim of a ransomware attack, it is investigating the theft of sensitive information....
Image: Shutterstock.com Three different cybercriminal groups claimed access to internal networks at communications giant T-Mobile in more than 100 separate...
US CISA added an actively exploited vulnerability in the ZK Java Web Framework to its Known Exploited Vulnerabilities Catalog. U.S....
Resecurity identified one of the largest investment fraud networks, tracked as Digital Smoke, by size and volume of operations. Resecurity...
Side-Channel Attack against CRYSTALS-Kyber CRYSTALS-Kyber is one of the public-key algorithms currently recommended by NIST as part of its post-quantum...
Threat actors hacked the home computer of a DevOp engineer, they installed a keylogger as part of a sophisticated cyber...
Data allegedly stolen from the American gaming giant Activision in December security breach were leaked on a cybercrime forum. A...
Researchers detailed a new wave of attacks distributing the PlugX RAT disguised as a legitimate Windows debugger tool. Trend Micro...