ChromeLoader Malware Is Targeting Gamers
Cybersecurity researchers recently discovered a new wave of ChromeLoader malware that threat actors are using to circumvent antivirus software and…
Cybersecurity researchers recently discovered a new wave of ChromeLoader malware that threat actors are using to circumvent antivirus software and…
A stealthy Unified Extensible Firmware Interface (UEFI) bootkit called BlackLotus has become the first publicly known malware capable of bypassing…
Welcome to our February 2023 list of data breaches and cyber attacks. Our research identified 106 publicly disclosed incidents accounting…
Twitter is down for thousands of users this morning. When users log in, they see a message that says “Welcome…
Threat actors exploited a compromised Kubernetes container to attempt privilege escalation into an AWS account. Operation Scarleteel, as it was…
In 2022, I started a podcast aimed at converting more Gen Z to seek careers in cybersecurity. In doing so,…
On November 30, 2022, password manager LastPass informed customers of a cybersecurity incident following unusual activity within a third-party cloud…
Access control is an important security measure for organizations of all sizes. Without it, intruders can gain access to sensitive…
US broadcaster Dish Network has confirmed that hackers are behind the outages inflicted on its customers since Friday. An internal…
Google has announced the general availability of client-side encryption (CSE) for Gmail and Calendar, months after piloting the feature in…