Iranian Hackers Target Global Airlines to Steal Sensitive Data
APT39, a hacker collective connected to Iran’s Ministry of Intelligence and Security (MOIS), was exposed as operating through the compromised...
Read more →APT39, a hacker collective connected to Iran’s Ministry of Intelligence and Security (MOIS), was exposed as operating through the compromised...
Read more →The well-known npm package eslint-config-prettier was released without authorization, according to several GitHub users, even though its repository did not...
Read more →Hexagon ETQ’s Java-based quality management system, ETQ Reliance, has several serious flaws, according to a new security research revelation by...
Read more →AhnLab Security Intelligence Center (ASEC) has been actively tracking cyber threats exploiting vulnerable Linux servers through strategically deployed honeypots, with...
Read more →Cybersecurity researchers have provided insight into a persistent threat cluster linked to the well-known North Korean state-sponsored hacker outfit Lazarus,...
Read more →The UK government has announced a comprehensive ban preventing public sector organizations from paying ransom demands to cybercriminals, marking a...
Read more →A threat actor claiming to possess a zero-day Local Privilege Escalation (LPE) exploit targeting Apple’s macOS operating system has emerged...
Read more →Cisco has issued an urgent security advisory warning that a set of critical remote code execution (RCE) vulnerabilities affecting its...
Read more →Security researchers at Lookout have identified four novel samples of DCHSpy, an advanced Android surveillanceware attributed to the Iranian threat...
Read more →wolfSSL has released version 5.8.2 to address several critical security vulnerabilities, with the most significant being a high-severity Apple trust...
Read more →Dark web travel agencies have developed into highly skilled organizations operating in the murky corners of cybercrime, using hacked credit...
Read more →Researchers uncovered an active Android malware cluster that ingeniously combines brand impersonation with traffic monetization tactics, targeting users across multiple...
Read more →