New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
Dec 01, 2023NewsroomMobile Security / Banking Security Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has...
Dec 01, 2023NewsroomMobile Security / Banking Security Cybersecurity researchers have disclosed a new sophisticated Android malware called FjordPhantom that has...
Hunters researchers noted the vulnerability could lead to privilege escalation. Google said the report “does not identify an underlying security...
Breaking Laptop Fingerprint Sensors They’re not that good: Security researchers Jesse D’Aguanno and Timo Teräs write that, with varying degrees...
Nov 28, 2023NewsroomData Security / Data Breach Cybersecurity researchers have detailed a "severe design flaw" in Google Workspace's domain-wide delegation...
Nov 24, 2023NewsroomCyber Attack / Malware Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called...
Nov 24, 2023NewsroomCloud security / Data Protection Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put...
Ahead of OpenAI CEO Sam Altman’s four days in exile, several staff researchers wrote a letter to the board of...
New SSH Vulnerability This is interesting: For the first time, researchers have demonstrated that a large portion of cryptographic keys...
Nov 15, 2023NewsroomRansomware / Vulnerability Cybersecurity researchers have demonstrated a new technique that exploits a critical security flaw in Apache...
Researchers from Cado Security Labs have recently spotted a novel campaign, dubbed OracleIV, exploiting misuse of Docker Engine API to...
Nov 13, 2023NewsroomNational Security / Cyber Attack Cybersecurity researchers have discovered what they say is malicious cyber activity orchestrated by...
Nov 13, 2023NewsroomCyber Warfare / Malware Cybersecurity researchers have warned about a Windows version of a wiper malware that was...
ESET researchers have identified what appears to be a watering-hole attack on a regional news website that delivers news about...
Nov 10, 2023NewsroomCyber Attack / Threat Intelligence Cybersecurity researchers have discovered a stealthy backdoor named Effluence that's deployed following the...
Nov 08, 2023NewsroomCloud Security / Cryptocurrency Cybersecurity researchers have developed what's the first fully undetectable cloud-based cryptocurrency miner leveraging the...