First Ever iOS Trojan Steals Facial Recognition Data
A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept...
Read more →A novel, very sophisticated mobile Trojan dubbed GoldPickaxe.iOS that targets iOS users exclusively was discovered to collect facial recognition data, intercept...
Read more →A critical security vulnerability was detected in TeamCity On-Premises, tagged as CVE-2024-23917, with a CVSS score of 9.8. An unauthenticated...
Read more →Vyacheslav Igorevich Penchukov, a 37-year-old resident of Donetsk, Ukraine, has pleaded guilty to his key role in developing and deploying...
Read more →Outlook has been discovered to have an interesting vulnerability while handling specific hyperlinks, which was found to be exploited by...
Read more →Imagine a cascading blackout, disrupted pipelines, or manipulated manufacturing processes – all orchestrated through a cyberattack. This chilling reality paints...
Read more →Wireshark is backed by the nonprofit Wireshark Foundation, which relies on your support to advance protocol analysis education. However, Wireshark...
Read more →An advanced phishing attack typically involves sophisticated tactics such as compelling email and website replicas that are often tailored to...
Read more →While Artificial Intelligence holds immense potential for good, its power can also attract those with malicious intent. State-affiliated actors, with...
Read more →A new flaw has been discovered in DNSSEC, which, when exploited by threat actors, could result in the unavailability of...
Read more →As part of its February 2024 Patch Tuesday updates, Microsoft has published patches to address 73 security flaws, including two...
Read more →Threat actors exploit HijackLoader because it is a powerful tool for injecting malicious code into legitimate processes, enabling stealthy execution...
Read more →Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats...
Read more →