SAP has issued a crucial security update addressing multiple high-severity vulnerabilities in its NetWeaver Application Server for Java, specifically within…
In an attack campaign dubbed “Operation Digital Eye,” a suspected China-nexus threat actor has been observed targeting business-to-business IT service…
SUMMARY AppLite Trojan: A new, stealthy banking trojan targeting Android devices, capable of stealing banking credentials, crypto wallets, and sensitive…
Stamus Networks announced Clear NDR, an open and transparent NDR system that empowers cyber defenders to uncover and stop serious…
Dec 10, 2024Ravie LakshmananMobile Security / Cryptocurrency Cybersecurity researchers have shed light on a sophisticated mobile phishing (aka mishing) campaign…
An ongoing RedLine info-stealer effort targets Russian-speaking entrepreneurs using unlicensed corporate software copies to automate business operations. Attackers were distributing…
Attackers are distributing a malicious .NET-based HPDxLIB activator disguised as a new version, which is signed with a self-signed certificate,…
Horizon3.ai launched NodeZero Insights, a platform designed for security leaders, CIOs, CISOs and practitioners. This new solution delivers real-time dashboards…
Millions of unlawfully retained custody images could still be used for facial-recognition purposes by UK police, says biometric commissioner of…
Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain…
10 Dec HackerOne’s Largest Bug Bounty Program Boasts 300 Hackers, $2M In Rewards Posted at 08:40h in Blogs by Taylor…
Attackers are exploiting a vulnerability (CVE-2024-50623) in file transfer software by Cleo – LexiCo, VLTransfer, and Harmony – to gain…










