Android Under Siege as Hackers Harvest Credentials and Track Keystrokes
The Zscaler ThreatLabz team has uncovered significant advancements in the Anatsa malware, also known as TeaBot, an Android banking trojan...
Read more →The Zscaler ThreatLabz team has uncovered significant advancements in the Anatsa malware, also known as TeaBot, an Android banking trojan...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about a critical zero-day vulnerability affecting Apple iOS,...
Read more →Cybersecurity researchers have developed an artificial intelligence system capable of automatically generating working exploits for published Common Vulnerabilities and Exposures...
Read more →Cyber threat actors have launched sophisticated phishing operations aimed at military and government personnel in South Asia, leveraging defense-related lures...
Read more →A critical security vulnerability has been discovered in the widely-used sha.js npm package, exposing millions of applications to sophisticated hash...
Read more →The Belarusian-affiliated threat actor UAC-0057, also known as UNC1151, FrostyNeighbor, or Ghostwriter, has been using weaponized archives that contain phony...
Read more →Trellix Advanced Research Center has exposed an infection chain that weaponises nothing more than a filename to compromise Linux hosts....
Read more →A critical security vulnerability in Microsoft Azure’s API Connection architecture has been discovered that could allow attackers to completely compromise...
Read more →Industrial technology company Colt has confirmed that a recent ransomware attack on its business support systems resulted in the theft...
Read more →The National Institute of Standards and Technology (NIST) has unveiled a comprehensive initiative to address the growing cybersecurity challenges associated...
Read more →A critical security vulnerability has been discovered in the widely-used sha.js npm package, exposing millions of applications to sophisticated hash...
Read more →A critical vulnerability in Docker Desktop for Windows has been discovered that allows any container to achieve full host system...
Read more →