Security researchers have identified Mirax, a sophisticated Remote Access Trojan (RAT) that is redefining mobile malware by transforming infected smartphones into residential proxy nodes, enabling...
Cisco has issued a critical security advisory warning of an authentication bypass vulnerability in Cisco Catalyst SD-WAN Controller and Cisco Catalyst SD-WAN Manager that...
A new wave of highly targeted cyberattacks is putting hospitals, local governments, and even defense-linked operators at risk leveraging deception, advanced malware,...
Our inboxes are gateways to our personal and professional lives. They hold sensitive information, access credentials, and confidential communications. With phishing attacks,...
Italian defense giant Leonardo has announced a significant shift in its strategic focus, prioritizing investments in cybersecurity, artificial intelligence (AI), and space exploration.
This...
Cybercriminals are constantly devising new methods to infiltrate systems and steal sensitive information.
A recent discovery highlights their cunning tactics: deploying remote access trojans...
Microsoft's monthly security update, released in March 2024, addressed 61 vulnerabilities across various products, highlighting the continuous battle against evolving cyber threats.
While this...
A successful cyberattack can inflict a multitude of wounds on a company. Beyond the potential financial losses and reputational damage, data loss or destruction...
Tensions rise as news emerges of a South Korean citizen being detained in Russia on charges of cyber espionage. This incident highlights the ever-present...
PrestaShop store owners in France and Spain are facing a data breach crisis. A significant amount of customer data, reportedly impacting over 250,000 customers...
WordPress website owners beware! A recent vulnerability in a popular plugin has exposed thousands of websites to potential compromise. Let's delve into the details...
The financially motivated threat actor group, Magnet Goblin, has once again made headlines by deploying a new Linux variant of their custom malware, NerbianRAT....
A recently disclosed critical vulnerability in Fortinet's FortiOS operating system poses a serious threat to organizations using Fortinet SSL VPNs. This flaw, identified as...
Microsoft recently disclosed a data breach impacting a small percentage of its employees, primarily those working in cybersecurity and legal departments.
The attack, attributed...
Deepfakes, once primarily associated with humorous celebrity parodies, have evolved into a sophisticated tool for malicious actors.
Companies across various sectors are increasingly becoming...
The notorious Black Cat (also known as ALPHV) ransomware group has seemingly disappeared from the online landscape. Their servers, used to communicate with infected...
American Express (Amex) recently issued a security alert notifying cardholders of a data breach that potentially exposed their information through a third-party service provider....
Ransomware attacks, where malicious actors encrypt a victim's data and demand a ransom for its decryption, have become a major concern for individuals and...
The Cybersecurity and Infrastructure Security Agency (CISA) recently issued three critical advisories highlighting vulnerabilities in widely used Industrial Control Systems (ICS) components.
These vulnerabilities,...
In a concerning development, a recent cyberattack severely disrupted the operations of Change Healthcare, the largest healthcare payment system in the United States. This...
Cybersecurity concerns are heightened as the notorious cybercrime groups GhostSec and Stormous join forces to launch double-extortion ransomware attacks across over 15 countries.
This collaboration...
Apple has released security patches to address critical zero-day vulnerabilities impacting various iPhone, iPad, and Mac models.
These vulnerabilities, actively exploited in the wild,...
VMware, a leading provider of virtualization software, recently released security patches to address critical vulnerabilities affecting its popular products, ESXi, Workstation, and Fusion.
These...