New Malware App on Google Play With Over 20 Million Downloads
Recently the cybersecurity experts at Dr. Web antivirus reported that over 20 million devices have recently downloaded a highly successful new category of activity-tracking apps…
Recently the cybersecurity experts at Dr. Web antivirus reported that over 20 million devices have recently downloaded a highly successful new category of activity-tracking apps…
The Internet Systems Consortium (ISC) released security advisories on January 25, 2023, to address flaws in the DNS software suite BIND. A denial of service…
An investigation by cyber security experts at Palo Alto Network’s Unit 42 team recently revealed that a variation of PlugX malware has the ability to…
A new strain of ransomware named Mimic has been uncovered recently by security experts at Trend Micro in June 2022. Mimic takes advantage of the…
In the latter half of 2022, a significant number of cyber attacks utilizing a remote code execution vulnerability in Realtek Jungle SDK were reported. These…
Akamai researchers have made available a demonstration exploit code for a significant vulnerability in Windows CryptoAPI that was identified by the National Security Agency (NSA)…
GoTo, formerly LogMeIn Inc., has acknowledged that a threat actor stole an encryption key that gave access to a portion of the backup files that were…
It has been officially confirmed by the Federal Bureau of Investigation (FBI) that the cyber-attacks on the cryptocurrency exchange, Harmony Horizon, which resulted in the…
In an effort to ensure the safety and security of its customers, Apple has taken the necessary steps to address a potentially dangerous vulnerability that…
Recently, Cyble Research and Intelligence Labs (CRIL) discovered Aurora Stealer malware imitating popular applications on phishing sites to infect as many users as possible. To…
According to The Washington Post, a new Twitter whistleblower has come forward, confirming the alarming evidence from last year regarding the dismal status of the company’s…
To assist the Department of Defense (DoD) and other system administrators in identifying and minimising security risks related to the transition to Internet Protocol version…