Supply Chain Attack Unleashed via Compromised VS Code Extension
A sophisticated supply chain attack targeting cryptocurrency developers through the compromise of ETHcode, a legitimate Visual Studio Code extension with...
Read more →A sophisticated supply chain attack targeting cryptocurrency developers through the compromise of ETHcode, a legitimate Visual Studio Code extension with...
Read more →A sophisticated Trojan malware campaign has been targeting mobile device users across iOS and Android platforms since February 2024, with...
Read more →A new Android vulnerability called TapTrap that allows malicious apps to bypass the operating system’s permission system without requiring any...
Read more →A sophisticated campaign by an initial access broker (IAB) group exploiting leaked Machine Keys from ASP.NET websites to gain unauthorized...
Read more →Google has announced the expansion of its Advanced Protection Program to Chrome on Android, providing enhanced security features specifically designed...
Read more →A sophisticated new distribution method for XwormRAT malware that leverages steganography techniques to hide malicious code within legitimate files. This...
Read more →A sophisticated new campaign involving the Anatsa Android banking trojan, marking its third major offensive against mobile banking customers in...
Read more →Microsoft has disclosed a significant security vulnerability in Windows BitLocker that allows attackers to bypass critical security protections through a...
Read more →Splunk has published a critical security advisory revealing that its Security Orchestration, Automation and Response (SOAR) platform was shipping vulnerable...
Read more →Splunk has released critical security updates for its Enterprise platform, addressing multiple vulnerabilities in bundled third-party packages across several product...
Read more →A critical security vulnerability has been discovered in Citrix’s Windows Virtual Delivery Agent that could allow attackers with low-level system...
Read more →A critical security vulnerability has been discovered in Fortinet’s FortiWeb web application firewall that allows unauthenticated attackers to execute malicious...
Read more →