First Mobile Crypto Drainer on Google Play Steals $70K from Users
A malicious app disguised as a legitimate WalletConnect tool targeted mobile users on Google Play. The app stole crypto assets from unsuspecting victims. Learn how…
A malicious app disguised as a legitimate WalletConnect tool targeted mobile users on Google Play. The app stole crypto assets from unsuspecting victims. Learn how…
In recent days, a significant number of UK users on Facebook and Instagram have fallen victim to a scam that has prompted urgent warnings from…
Sep 27, 2024Ravie LakshmananSoftware Security / Vulnerability Progress Software has released another round of updates to address six security flaws in WhatsUp Gold, including two…
Cisco Talos’ Vulnerability Research team revealed two significant vulnerabilities in Microsoft products that have been patched by the company over the past two Patch Tuesdays.…
Conversational AI platforms, powered by chatbots, are witnessing a surge in malicious attacks, which leverage NLP and ML are increasingly being used by businesses to…
A critical vulnerability in Kia vehicles allowed hackers to control cars remotely using only license plates. The flaw has been patched, but it highlights the…
As companies work to reap the benefits of artificial intelligence (AI), they also must beware of its nefarious potential. Amid an AI-driven uptick in social…
In June of 2024 security researchers uncovered a set of vulnerabilities in the Kia dealer portal that allowed them to remotely take over any Kia…
Cyber security companies have made global headlines recently with a series of significant incidents which caused widespread disruption. The CrowdStrike incident is estimated to have…
The National Institute of Standards and Technology (NIST) has released updated guidelines for password security, marking a significant shift from traditional password practices. These new…
The LummaC2 obfuscator employs a novel control flow protection scheme designed specifically for its stealer component, which is part of a broader set of transformations,…
We live in an era of cyber ‘incidents,’ from WannaCry to MOVEit. However, it’s undeniably rare that a vendor finds themselves at the epicentre of…