Cybersecurity researchers have uncovered a zero-day vulnerability in the widely used utility WinZip, which allows adversaries to...
Security
The group known as Lotus Panda, believed to be linked to China, has once again drawn the...
A cybercriminal campaign linked to the North Korean threat group Kimsuky has once again drawn the attention...
The United States Federal Bureau of Investigation has stated that it is unable to locate documents related...
The fraudulent Scallywag scheme, built upon specially crafted WordPress plugins, had long been generating billions of ad...
The Cybersecurity and Infrastructure Security Agency (CISA) is discontinuing the use of two pivotal cyber threat analysis...
Modern smartphones have long since become vaults of personal secrets—yet some of those secrets, it turns out,...
The FBI has issued a warning regarding a large-scale fraud scheme in which criminals impersonate representatives of...
Experts at Socket have uncovered a new software supply chain attack involving counterfeit npm libraries masquerading as...
Zoom’s remote access functionality has become the foundation of a new, highly sophisticated attack campaign targeting professionals...
One of the alleged operators behind the SmokeLoader malware has found himself at the center of a...
Hackers have discovered a method to deceive users by sending emails that appear to originate directly from...
Scientists are sounding the alarm: DNA sequencing technologies may become the next prime target for cyberattacks. The...
ASUS has issued a warning regarding a critical vulnerability in its routers, specifically linked to the AiCloud...
Security specialists at Cleafy, a company focused on mobile device protection, have unveiled the details of a...