Chrome, Edge users beset by malicious extensions that can’t be easily removed
A widespread campaign featuring a malicious installer that saddles users with difficult-to-remove malicious Chrome and Edge browser extensions has been...
Read more →A widespread campaign featuring a malicious installer that saddles users with difficult-to-remove malicious Chrome and Edge browser extensions has been...
Read more →Aug 12, 2024Ravie LakshmananCybersecurity / Network Security The maintainers of the FreeBSD Project have released security updates to address a...
Read more →In the beginning of August 2024, Sonos released a security advisory in which they fixed two security vulnerabilities that were...
Read more →Head Mare, a hacktivist group targeting Russia and Belarus, leverages phishing campaigns distributing WinRAR archives to exploit CVE-2023-38831 for initial...
Read more →In the digital age, the dark web has emerged as a clandestine marketplace for illicit activities, including the sale of stolen data, illegal software and various forms of malware. The proliferation of...
Read more →Discover how researchers exploited vulnerabilities in Google’s Quick Share to achieve remote code execution (RCE). Learn about the “QuickShell” attack...
Read more →In 2023, no fewer than 94 percent of businesses were impacted by phishing attacks, a 40 percent increase compared to...
Read more →The threat landscape is significantly evolving, and cybersecurity researchers are continuously developing new security mechanisms to mitigate such evolving and...
Read more →After a good year of sustained exuberance, the hangover is finally here. It’s a gentle one (for now), as the...
Read more →Australian mining company Evolution Mining Limited has become the latest victim of a ransomware attack. The company, known for its...
Read more →Security researchers have uncovered severe vulnerabilities in the Ewon Cosy+, a widely used industrial remote access gateway tool, allowing them...
Read more →Aug 12, 2024Ravie LakshmananCritical Infrastructure / Vulnerability Cybersecurity researchers have identified a number of security shortcomings in photovoltaic system management...
Read more →