Lunar Spider Infected Windows Machine in Single Click and Harvested Login Credentials
Lunar Spider, a newly observed malware strain, has emerged as a potent threat to Windows environments by compromising systems in...
Read more →Lunar Spider, a newly observed malware strain, has emerged as a potent threat to Windows environments by compromising systems in...
Read more →Japanese beverage conglomerate Asahi Group Holdings has halted production at its domestic factories following a significant cyberattack that crippled its...
Read more →A malicious npm package masquerading as the official Postmark MCP Server has been exfiltrating user emails to an external server. ...
Read more →VMware has disclosed critical security vulnerabilities in vCenter Server and NSX platforms that could allow attackers to enumerate valid usernames...
Read more →VMware has released an advisory to address three high-severity vulnerabilities in VMware Aria Operations, VMware Tools, VMware Cloud Foundation, VMware...
Read more →A zero-day local privilege escalation vulnerability in VMware Tools and VMware Aria Operations is being actively exploited in the wild....
Read more →Western Digital has released security updates for a critical vulnerability affecting multiple My Cloud network-attached storage (NAS) devices. The flaw,...
Read more →Apple has rolled out security updates across its operating systems to address a vulnerability in the Font Parser component that...
Read more →The cybersecurity community is currently observing a surge in interest around Olymp Loader, a recently unveiled Malware-as-a-Service (MaaS) platform written...
Read more →A sophisticated cyber campaign is exploiting the trust users place in popular collaboration software, tricking them into downloading a weaponized...
Read more →Luxury department store Harrods has disclosed a significant data breach affecting approximately 430,000 customer records after a third-party provider was...
Read more →A sophisticated malware campaign has emerged that weaponizes seemingly legitimate productivity tools to infiltrate systems and steal sensitive information. The...
Read more →