New Prilex Malware Blocks Contactless Payments
Prilex is indeed a single threat actor that transformed from malware targeted at ATMs into distinctive modular point-of-sale (PoS) malware. Prilex...
Read more →Prilex is indeed a single threat actor that transformed from malware targeted at ATMs into distinctive modular point-of-sale (PoS) malware. Prilex...
Read more →Multiple fraudulent Microsoft Partner Network accounts were discovered to have created harmful OAuth applications, causing breaches in organizations’ cloud environments...
Read more →GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning...
Read more →The lack of rate-limiting in Instagram was discovered by Gtm Mänôz, a security researcher from Kathmandu, Nepal. This flaw could...
Read more →Microsoft has been strongly encouraging its customers to keep updating their Exchange servers, in addition to taking steps to ensure...
Read more →The identity of the individual behind the Golden Chickens malware-as-a-service has been uncovered by cybersecurity experts. The perpetrator, known online...
Read more →As a result of an international law enforcement operation, the sites utilized by the Hive ransomware operation for both payments...
Read more →A joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA), and Multi-State Information Sharing...
Read more →Recently, the US Justice Department along with the eight states filed a lawsuit against Google, accusing the company of having...
Read more →A recent report reveals that the number of attacks on financial service APIs and web applications worldwide increased by 257%. There are...
Read more →The Wireshark Team has recently unveiled the latest iteration of their widely-utilized packet analyzer, Wireshark 4.0.3. This version boasts a...
Read more →Silver is an open-source command-and-control framework that is becoming increasingly popular among malicious actors at current attacks. As threat actors...
Read more →