In the dynamic realm of mobile application security, cybercriminals employ ever more sophisticated forms of malware, with code obfuscation standing…
Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code. All these documents…
By Sudeep Padiyar, Senior Director, Product Management at Traceable AI When Data Loss Prevention (DLP) was conceived as a security…
Three Command injection vulnerabilities have been discovered in Zyxel NAS (Network Attached Storage) products, which could allow a threat actor…
Government’s slow progress compensating subpostmasters who had their lives ruined by one of its organisations, the Post Office, has forced…
A malicious campaign targeting mobile banking users in Iran is relying on hundreds of Android applications for credential and credit…
A recent campaign has been observed to be delivering DJvu ransomware through a loader that pretends to be freeware or…
NoEscape ransomware group has listed Science History Institute on its dark web portal. Science History Institute shares stories of significant…
The latest analysis shows that tens of millions of people are creating weak passwords on three of the four most…
In a significant move to combat cyber-enabled criminal activities, the U.S. Department of the Treasury’s Office of Foreign Assets Control…
In a pivotal update to the Okta security incident divulged in October 2023, Okta Security has unearthed additional intricacies surrounding…
Luxury lingerie brand Honey Birdette seems to have become the latest target of the notorious 8Base ransomware group. The hacker…










