Hackers leveraged Microsoft Teams to manipulate a victim into granting remote access to their system. The attack, analyzed by Trend…
Digital license plates, already legal to buy in a growing number of states and to drive with nationwide, offer a…
Cybersecurity researchers have discovered a new PHP-based backdoor called Glutton that has been put to use in cyber attacks targeting…
PUMAKIT, a sophisticated rootkit that uses advanced stealth mechanisms Pierluigi Paganini December 15, 2024 Researchers discovered PUMAKIT, a Linux rootkit…
A new wave of cyberattacks has emerged, targeting YouTube creators through malicious collaboration requests that exploit the trust between creators…
Dec 16, 2024Ravie LakshmananCryptocurrency / Phishing Attack Cybersecurity researchers are calling attention to a new kind of investment scam that…
We have witnessed an undeniable backlash against sustainability this year. Despite the news cycle being awash with coverage of the…
Telecom Namibia has fallen victim to a cyberattack, resulting in the leak of over 400,000 customer files. The Telecom Namibia…
Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise Pierluigi Paganini December 16, 2024 Researchers discovered multiple flaws…
Multiple flaws in Volkswagen Group’s infotainment unit allow for vehicle compromise Pierluigi Paganini December 16, 2024 Researchers discovered multiple flaws…
Rhode Island is tackling with a major cybersecurity breach that has compromised the personal information of thousands of residents. The…
A critical Remote Code Execution (RCE) vulnerability has been discovered in a popular open-source biomedical tool used worldwide. This vulnerability,…










