Latest Threats

Global Phishing Attacks Spawn Three New Malware Strains

Global Phishing Attacks Spawn Three New Malware Strains

The never-seen malware strains have "professionally coded sophistication" and were...

Pulse Secure VPNs Get a Fix for Critical Zero-Day Bugs

Pulse Secure VPNs Get a Fix for Critical Zero-Day Bugs

The security flaw tracked as CVE-2021-22893 is being used by at least two APTs likely...

Apple Fixes Zero‑Day Security Bugs Under Active Attack

Apple Fixes Zero‑Day Security Bugs Under Active Attack

On Monday, Apple released a quartet of unscheduled updates for iOS, macOS, and watchOS,...

Hundreds of Millions of Dell Users at Risk from Kernel-Privilege Bugs

Hundreds of Millions of Dell Users at Risk from Kernel-Privilege...

The privilege-escalation bug remained hidden for 12 years and has been present in...

Sneakers, Gaming, Nvidia Cards: Retailers Can Stop Shopping Bots

Sneakers, Gaming, Nvidia Cards: Retailers Can Stop Shopping...

Jason Kent, hacker in residence at Cequence Security, says most retailers are applying...

New Attacks Slaughter All Spectre Defenses 

New Attacks Slaughter All Spectre Defenses 

The 3+ years computer scientists spent concocting ways to defend against these supply-chain...

Hewlett Packard Enterprise Plugs Critical Bug in Edge Platform Tool

Hewlett Packard Enterprise Plugs Critical Bug in Edge Platform...

Researchers warned that unpatched versions of HPE’s Edgeline Infrastructure Manager...

Deepfake Attacks Are About to Surge, Experts Warn

Deepfake Attacks Are About to Surge, Experts Warn

New deepfake products and services are cropping up across the Dark Web.

New Buer Malware Downloader Rewritten in E-Z Rust Language

New Buer Malware Downloader Rewritten in E-Z Rust Language

It's coming in emails disguised as DHL Support shipping notices and is apparently...

PortDoor Espionage Malware Takes Aim at Russian Defense Sector

PortDoor Espionage Malware Takes Aim at Russian Defense...

The stealthy backdoor is likely being used by Chinese APTs, researchers said.

WeSteal: A Cryptocurrency-Stealing Tool That Does Just That

WeSteal: A Cryptocurrency-Stealing Tool That Does Just...

The developer of the WeSteal cryptocurrency stealer can’t be bothered with fancy...

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange

Oliver Tavakoli, CTO of Vectra AI, discusses the differences between the massive...

Microsoft Warns of 25 Critical Vulnerabilities in IoT, Industrial Devices

Microsoft Warns of 25 Critical Vulnerabilities in IoT,...

Azure Defender security team discovers that memory allocation is a systemic problem...

Babuk Ransomware Gang Mulls Retirement

Babuk Ransomware Gang Mulls Retirement

The RaaS operators have been posting, tweaking and taking down a goodbye note, saying...

F5 Big-IP Vulnerable to Security-Bypass Bug

F5 Big-IP Vulnerable to Security-Bypass Bug

The KDC-spoofing flaw tracked as CVE-2021-23008 can be used to bypass Kerberos security...

Experian API Leaks Most Americans’ Credit Scores

Experian API Leaks Most Americans’ Credit Scores

Researchers fear wider exposure, amidst a tepid response from Experian.

Multi-Gov Task Force Plans to Take Down the Ransomware Economy

Multi-Gov Task Force Plans to Take Down the Ransomware...

A coalition of 60 global entities (including the DoJ) has proposed a sweeping plan...

COVID-19 Results for 25% of Wyoming Accidentally Posted Online

COVID-19 Results for 25% of Wyoming Accidentally Posted...

Sorry, we’ve upchucked your COVID test results and other medical and personal data...

Nintendo Sues Video-Game Pirates

Nintendo Sues Video-Game Pirates

Nintendo is questing after its third successful lawsuit against circumvention-device...

Linux Kernel Bug Opens Door to Wider Cyberattacks

Linux Kernel Bug Opens Door to Wider Cyberattacks

The information-disclosure flaw allows KASLR bypass and the discovery of additional,...

Smishing: Why Text-Based Phishing Should Be on Every CISO’s Radar

Smishing: Why Text-Based Phishing Should Be on Every CISO’s...

Phil Richards, Chief Security Officer at Ivanti, discusses dramatic growth in smishing...

Babuk Ransomware Gang Targets Washington DC Police

Babuk Ransomware Gang Targets Washington DC Police

The RaaS developers thumbed their noses at police, saying “We find 0 day before...

Apple Patches Zero-Day MacOS Bug That Can Bypass Anti-Malware Defenses

Apple Patches Zero-Day MacOS Bug That Can Bypass Anti-Malware...

A variant of Mac No. 1 threat Shlayer since January already has been exploiting...

Flubot Spyware Spreading Through Android Devices

Flubot Spyware Spreading Through Android Devices

The malware is spreading rapidly through ‘missed package delivery’ SMS texts, prompting...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here