Cybercriminals Combine Phishing and EV Certificates to Deliver Ransomware Payloads
The threat actors behind RedLine and Vidar information stealers have been observed pivoting to ransomware through phishing campaigns that spread…
The threat actors behind RedLine and Vidar information stealers have been observed pivoting to ransomware through phishing campaigns that spread…
Iranian nation-state actors have been conducting password spray attacks against thousands of organizations globally between February and July 2023, new…
A set of memory corruption flaws have been discovered in the ncurses (short for new curses) programming library that could…
A download manager site served Linux users malware that stealthily stole passwords and other sensitive information for more than three…
Employee offboarding is no one’s favorite task, yet it is a critical IT process that needs to be executed diligently…
A high-severity security flaw has been disclosed in N-Able's Take Control Agent that could be exploited by a local unprivileged…
The iPhone belonging to Galina Timchenko, a prominent Russian journalist and critic of the government, was compromised with NSO Group's…
Three interrelated high-severity security flaws discovered in Kubernetes could be exploited to achieve remote code execution with elevated privileges on…
More details have emerged about a set of now-patched cross-site scripting (XSS) flaws in the Microsoft Azure HDInsight open-source analytics…
In today's digital age, SaaS applications have become the backbone of modern businesses. They streamline operations, enhance productivity, and foster…