“Beyond the border scam”, pay attention to the instance of the new Nigerian fraud Pierluigi Paganini February 22, 2024 Security…
The Bitwarden open-source password management service has introduced a new inline auto-fill menu that addresses the risk of user credentials being…
Large-scale malware distribution campaigns are abusing Google Cloud Run to transmit banking trojans, including Astaroth (also known as Guildma), Mekotio,…
Hackers target Apex code vulnerabilities in Salesforce to exploit security weaknesses, gain unauthorized access to sensitive data, or manipulate the…
You are not alone, an AT&T outage is happening across the United States, and the company is working to bring…
A pair of newly-disclosed vulnerabilities in a widely-used remote desktop access application beloved of managed services providers (MSPs) is drawing…
Attackers are exploiting a maximum severity authentication bypass vulnerability to breach unpatched ScreenConnect servers and deploy LockBit ransomware payloads on…
A critical cybersecurity incident recently occurred where the Konni Remote Access Trojan (RAT), a highly covert and sophisticated malware that…
Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In…
Apple Shortcuts security vulnerability (CVE-2024-23204) allows attackers to access targeted devices and steal sensitive data – update your devices now!…
Toshiba, the Japanese electronics giant, and Orange, a major telecom company, have unveiled breakthroughs in quantum secure data transmission. Their…
One of the most alarming trends our ThreatDown Intelligence team has noticed lately is the increased exploitation of legitimate Remote…











