New research reveals critical vulnerabilities in Python applications for Windows including Snowflake, Gradio, Jupyter, and Streamlit that could allow hackers…
Cybersecurity researchers are warning about the security risks in the machine learning (ML) software supply chain following the discovery of…
Threat actors successfully deployed BlackSuit ransomware after maintaining access to a compromised network for 15 days. The intrusion, which began…
Argentine authorities have arrested a Russian national accused of laundering cryptocurrency payments linked to the notorious North Korean Lazarus Group….
Two critical vulnerabilities have been discovered in the Traccar GPS. These vulnerabilities, CVE-2024-31214 and CVE-2024-24809, allow unauthenticated attackers to execute…
Security researchers have recently identified a new malware strain that employs advanced obfuscation techniques to evade detection by antivirus software….
A cyberattack impacted operations at the Port of Seattle and Sea-Tac Airport Pierluigi Paganini August 26, 2024 A cyber attack…
Researchers uncovered a new type of denial-of-service (DoS) attack, known as the D(HE)at attack, exploits the computational demands of the…
WhatsApp’s security teams have identified and blocked a cluster of malicious activities originating from Iran. The targeted campaign, linked to…
August 23, 2024 – Facebook scammers are posting links to fake funeral live streams to get victims to sign up…
Aug 26, 2024Ravie LakshmananSoftware Security / Vulnerability Two security vulnerabilities have been disclosed in the open-source Traccar GPS tracking system…
Linux malware sedexp uses udev rules for persistence and evasion Pierluigi Paganini August 26, 2024 Researchers spotted a new stealthy…











