Attackers use dynamic code loading to bypass Google Play store’s malware detections
Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store....
Threat actors rely on the ‘versioning’ technique to evade malware detections of malicious code uploaded to the Google Play Store....
CISA, the FBI, and NSA, along with Five Eyes cybersecurity agencies published a list of the 12 most exploited vulnerabilities...
Experts warn that decommissioned medical infusion pumps sold via the secondary market could expose Wi-Fi configuration settings. The sale of...
OWASP released the OWASP Top 10 for LLM (Large Language Model) Applications project, which provides a list of the top...
Researchers discovered a bypass for a recently fixed actively exploited vulnerability in Ivanti Endpoint Manager Mobile (EPMM). Rapid7 cybersecurity researchers...
Russia-linked APT29 group targeted dozens of organizations and government agencies worldwide with Microsoft Teams phishing attacks. Microsoft Threat Intelligence reported...
Researchers warn that hundreds of Citrix servers have been hacked in an ongoing campaign exploiting the RCE CVE-2023-3519. Security researchers...
Experts spotted a spear-phishing Facebook campaign exploiting a zero-day vulnerability in Salesforce email services. Researchers from Guardio Labs uncovered a...
The fast food giant Burger King put their systems and data at risk by exposing sensitive credentials to the public...
US CISA added a second actively exploited Ivanti ‘s Endpoint Manager Mobile (EPMM) vulnerability to its Known Exploited Vulnerabilities catalog....
Researchers spotted a Python variant of the NodeStealer that was designed to take over Facebook business accounts and cryptocurrency wallets. Palo Alto...
The US government believes that China has deployed malware in key US power and communications networks that can be activated...
Threat actors are targeting Italian organizations with a phishing campaign aimed at delivering a new malware called WikiLoader. WikiLoader is...
Canon warns that sensitive data on the Wi-Fi connection settings stored in the memories of inkjet printers may not be...
Cado Security observed a new variant of the P2PInfect worm targets Redis servers with a previously undocumented initial access vector....