Wyze Labs is investigating a security issue while experiencing a service outage that has been causing connectivity issues since this…
While redirecting blame away from Turner and his cohorts, the claim is both false and deceptive, relying on assertions that,…
CISA adds Microsoft Exchange and Cisco ASA and FTD bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini February 16,…
US gov offers a reward of up to $10M for info on ALPHV/Blackcat gang leaders Pierluigi Paganini February 16, 2024 The…
SolarWinds has patched five remote code execution (RCE) flaws in its Access Rights Manager (ARM) solution, including three critical severity…
Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…
The notorious SpyNote Android spyware returns, exploiting Accessibility APIs to target crypto wallets and unsuspecting users, ultimately stealing their cryptocurrency….
Well, the GoldPickaxe Trojan does not literally steal your face, but it does steal an image of your face in…
Feb 16, 2024NewsroomRansomware / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched security flaw…
Security researchers analyzing the Alpha ransomware payload and modus operandi discovered overlaps with the now-defunct Netwalker ransomware operation. Netwalker was a prolific…
The integration of Artificial Intelligence (AI) tools into our daily routines has become an undeniable global phenomenon. However, as these…
Feb 16, 2024NewsroomEndpoint Security / Cryptocurrency Multiple companies operating in the cryptocurrency sector are the target of an ongoing malware…











