-
Huntress discovers ‘CrashFix,’ a new attack by KongTuke hacker group using fake ad blockers to crash browsers and trick office workers into installing ModeloRAT malware.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The new EU-funded GCVE project is breaking dependence on US databases to track software flaws. Discover how this decentralised system aims to ensure global cybersecurity.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
As emotional computing applications proliferate, the security threats they face require frameworks beyond traditional approaches.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Jordanian man pleads guilty to selling stolen corporate logins in FBI sting after extradition from Georgia; tied to access of 50+ company networks.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Cybersecurity researchers at Miggo Security found a flaw in Google Gemini that uses calendar invites to steal private data. Learn how this silent attack bypasses security.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Resecurity has identified PDFSIDER malware that exploits the legitimate PDF24 App to covertly steal data and allow remote access. Learn how this APT-level campaign targets corporate networks through spear-phishing and encrypted communications.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Researchers have found a new spying campaign using news about Venezuela to trick US government officials. Learn how the LOTUSLITE virus sneaks into computers to steal secrets.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
The activist website called “ICE List” was offline after a massive DDoS attack. The crash followed a leak of 4,500 federal agent names linked to the Renee Nicole Good shooting.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
A supply chain vulnerability in AWS CodeBuild recently put the entire AWS Console at risk. Learn how Wiz Research found the flaw and how Amazon responded to prevent a global security crisis.
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


