UNC2970 Hackers Targeting Job Seekers with Weaponized PDF Files
Trojanized PDF readers are malicious software that are disguised as legitimate PDF viewing applications. They are primarily used by the...
Read more →Trojanized PDF readers are malicious software that are disguised as legitimate PDF viewing applications. They are primarily used by the...
Read more →INE Security is proud to announce that it has been named a winner in the prestigious 2024 SC Awards, named...
Read more →Microsoft has issued a critical warning regarding a Windows kernel vulnerability that could lead to the disclosure of sensitive information....
Read more →Malvertising (malicious advertising) refers to the practice of embedding harmful code within online advertisements, which can lead to malware infections...
Read more →Discord has announced the rollout of end-to-end encryption (E2EE) for audio and video chats on its platform. This new feature...
Read more →The Windows MiniFilter driver, like the Sysmon driver, can be abused to prevent EDR drivers from loading. Endpoint Detection and...
Read more →The evolution of the threat landscape is marked by increasingly sophisticated cyber threats driven by advancements in technology and the...
Read more →Google has announced the release of Chrome 129, which is now available on the stable channel for Windows, Mac, and...
Read more →VMware has disclosed two critical security vulnerabilities affecting its vCenter Server and Cloud Foundation products that could allow attackers to...
Read more →A recent study has revealed that over 1,000 enterprise ServiceNow instances have unintentionally exposed sensitive corporate data through their Knowledge...
Read more →Access Sports Medicine & Orthopaedics, a leading sports medicine and orthopedics provider, has reported a significant data breach. The breach,...
Read more →Apple has released iOS 18, addressing a total of 32 security vulnerabilities across various components of its operating system. This...
Read more →