JQuery Attack Hits NPM, GitHub, Can Extract Web Form Data
A trojanized version of jQuery has been spreading on the npm JavaScript package manager, GitHub and elsewhere, for use in a jQuery attack, security researchers…
A trojanized version of jQuery has been spreading on the npm JavaScript package manager, GitHub and elsewhere, for use in a jQuery attack, security researchers…
Security researchers discovered a new sophisticated cyberespionage tool targeting Russian government entities in May 2024. The tool, dubbed CloudSorcerer, exploits popular cloud infrastructure services such…
The Russian Cyber Army Team has claimed responsibility for targeting the website of Telecom Liechtenstein. This alleged Liechtenstein cyberattack was announced in a post where…
The infamous ransomware group NoName has allegedly launched cyberattacks on MitID, the Finland Chamber of Commerce, and OP Financial Group. The NoName ransomware took to…
E-commerce supplier Shopify has confirmed that it did not experience a cyber security incident but stated that a data loss was caused by a third-party app.…
Cyble Research & Intelligence Labs (CRIL) analyzed 29 vulnerabilities in its weekly vulnerability report for June 26-July 2, including high severity and critical flaws in…
India’s leading telecom provider Bharti Airtel is embroiled in a data breach controversy after a hacker claimed to have stolen the personal information of nearly…
Cyble Research and Intelligence Labs (CRIL) researchers have uncovered an active campaign exploiting a Microsoft SmartScreen vulnerability to inject infostealers into users’ machines. Microsoft released…
Cloudflare’s privacy-first public DNS resolver service was hit by two simultaneous BGP issues recently, resulting in an unintentional BGP hijacking incident that highlights ongoing concerns…
GootLoader, a sophisticated JavaScript-based malware has continued to challenge cybersecurity experts with its unique evasion techniques. However, researchers have discovered a new method to circumvent…
Malicious actors are targeting HTTP File Servers (HFS) from Rejetto by leveraging vulnerabilities to deploy malware and cryptocurrency mining software. Specifically, threat actors are exploiting…
As online shoppers ready themselves for the approaching Amazon Prime Day on July 16-17, 2024, a day known for unusually extensive deals and exclusive offers,…