KeePass exploit helps retrieve cleartext master password, fix coming soon
The popular KeePass password manager is vulnerable to extracting the master password from the application’s memory, allowing attackers who compromise a device to retrieve the…
The popular KeePass password manager is vulnerable to extracting the master password from the application’s memory, allowing attackers who compromise a device to retrieve the…
Cyber security overall has a pretty wide spectrum, and solves vulnerability issues in different ways. Antivirus is the traditional method, where a program looks through…
Apple has addressed three new zero-day vulnerabilities exploited in attacks to hack into iPhones, Macs, and iPads. “Apple is aware of a report that this…
Apple has addressed three new zero-day vulnerabilities exploited in attacks to hack into iPhones, Macs, and iPads. “Apple is aware of a report that this…
In our recent webinar, “Bug Bounty Programs: Lessons Learned From Implementation In The Financial Service Industry”, we heard some great tips from an appsec leader…
Microsoft has decided to allow customers to choose when the last bits of Internet Explorer 11 (IE11) will be removed from their devices. This comes…
Malware is an umbrella term for viruses, trojans, spyware, adware etc. It is an abbreviation of “malicious software”. Spyware, as the name implies, is software that spies…
Group-IB’s cybersecurity researchers made a significant discovery, revealing undisclosed attack infrastructure employed by the highly active state-sponsored group SideWinder. Their targets mainly encompassed entities situated…
On May 16, Google announced new plans to delete accounts that have been inactive for two years, as well as accounts that were created and…
Tam Cymru researchers have recently revealed noteworthy patterns and irregularities from their continuous monitoring of QakBot’s command and control infrastructure. The researchers shared high-level insights…
The Department of Justice revealed today that an 18-year-old man named Joseph Garrison from Wisconsin had been charged with hacking into the accounts of around…
A cybercrime enterprise known as Lemon Group is leveraging millions of pre-infected Android smartphones worldwide to carry out their malicious operations, posing significant supply chain…