Several ransomware groups have begun actively deploying a strain of malware known as Skitnet during the post-exploitation...
Security
A threat actor known as Hazy Hawk has launched a widespread campaign to seize abandoned cloud assets...
Amid a surge in attacks targeting exposed internet-facing services, cybersecurity experts have identified a new malicious campaign...
For over eight months, a cybercriminal group has been distributing trojanized versions of the KeePass password manager,...
Threat actors continue to exploit popular open-source repositories as launchpads for the distribution of malicious code. This...
Researchers at ESET have uncovered the operations of a little-known yet active cyber-espionage group linked to China,...
The high-profile cyberattack on the British retail chain Marks & Spencer has taken a new turn. Sources...
Since February 2024, the Chrome Web Store has been hosting malicious browser extensions disguised as useful utilities,...
Every smartphone owner knows the first essential step with a new device: enabling screen lock. Most users...
A 19-year-old college student from Worcester, Massachusetts has pleaded guilty to orchestrating a large-scale cyberattack on PowerSchool—one...
Pwn2Own 2025 has concluded in Berlin, marking one of the most significant showcases of zero-day vulnerabilities in...
Mozilla has released emergency security updates for Firefox—just hours after the conclusion of the Pwn2Own Berlin 2025...
Security researchers have unveiled a method for circumventing KASLR—one of the kernel’s principal defense mechanisms—on fully updated...
Hackers have compromised the official website of RVTools—a widely used utility for managing VMware virtual infrastructures—and replaced...
The developers have released updates for several versions of the Linux kernel, including 6.14.7 and other actively...