Malevolent records: Exploiting the EvilVideo vulnerability on Telegram for Android
ESET Research ESET researchers uncovered a newly discovered loophole in Telegram for Android that enables the transmission of malignant files...
ESET Research ESET researchers uncovered a newly discovered loophole in Telegram for Android that enables the transmission of malignant files...
ESET Investigation A recent discovery by ESET researchers uncovers a zero-day exploit in Telegram for Android allowing the circulation of...
ESET Research Researchers at ESET came upon a new exploit in Telegram for Android, allowing the sneaky distribution of hazardous...
ESET Study ESET researchers stumbled upon a new Telegram for Android exploit that permits sending deceptive files disguised as videos...
July 23, 2024NewsroomICS Malware / Vital Infrastructure A group of digital security investigators have found what they claim is the...
Jul 23, 2024Press OfficeICS Malware / Critical Infrastructure Cyberspace analysts have unearthed what they perceive as the ninth Industrial Control...
A new variation of the Play ransomware, also known as Balloonfly and PlayCrypt, has been identified by cybersecurity experts. This...
Jul 17, 2024NewsroomCyber Espionage / Cryptocurrency Cybersecurity experts have unveiled a modernized version of a recognized thieving software that cyber...
July 15, 2024NewsroomSoftware Supply Chain Breach / Cybersecurity Risk Researchers in the cybersecurity field have reported an inadvertent leakage of...
Jul 09, 2024Editorial TeamVulnerability / Network Security A weakness in the RADIUS network authentication protocol known as BlastRADIUS has been...
Jul 09, 2024NewsroomVulnerability / Network Security A security flaw in the RADIUS network authentication protocol, known as BlastRADIUS, has been...
A group of researchers at Cybernews has stumbled upon the biggest collection of leaked passwords online, containing a staggering 9,948,575,739...
Jul 03, 2024NewsroomCyber Intrusion / Malware A team of cybersecurity researchers has brought to light an intrusion initiative that is...
Jun 26, 2024NewsroomCyber Attack / Malware Threat actors with suspected connections to China and North Korea have been identified in...
Jun 26, 2024NewsroomCyber Attack / Malware Malevolent entities potentially linked to China and North Korea have been associated with ransomware...