Phishing alert: Fake hotel reservation scam uses PDF links to spread MrAnon Stealer
10
Dec
2023

Fake hotel reservation phishing scam uses PDF links to spread MrAnon Stealer

MrAnon Stealer is capable of stealing data and gathering information from cryptocurrency wallets, browsers, messaging apps and VPN clients. Cybersecurity…

Researcher discovered a new lock screen bypass bug for Android 14 and 13
10
Dec
2023

Researcher discovered a new lock screen bypass bug for Android 14 and 13

Researcher discovered a new lock screen bypass bug for Android 14 and 13 Pierluigi Paganini December 10, 2023 Researchers discovered a…

Over 30% of Log4J apps use a vulnerable version of the library
10
Dec
2023

Over 30% of Log4J apps use a vulnerable version of the library

Roughly 38% of applications using the Apache Log4j library are using a version vulnerable to security issues, including Log4Shell, a…

10
Dec
2023

2023 Cloud Security Report

In 2023, the cloud is fundamentally delivering on its promised business outcomes, including flexible capacity and scalability, increased agility, improved…

Snatch Ransomware Group Claims The FDVA Cyber Attack
10
Dec
2023

Biggest Cybersecurity Slip-Ups Of 2023

Within the intricate landscape of cybersecurity, the year 2023 unfolds as a double-edged sword, where the interplay of innovation and…

WordPress 6.4.2 fixed a Remote Code Execution (RCE) flaw
10
Dec
2023

WordPress 6.4.2 fixed a Remote Code Execution (RCE) flaw

WordPress 6.4.2 fixed a Remote Code Execution (RCE) flaw Pierluigi Paganini December 10, 2023 WordPress 6.4.2 addressed a security vulnerability…

Week in review: Booking.com hotel booking scam, Kali Linux 2023.4 released
10
Dec
2023

Week in review: Booking.com hotel booking scam, Kali Linux 2023.4 released

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Advanced ransomware campaigns expose need…

Snatch Ransomware Group Claims The FDVA Cyber Attack
10
Dec
2023

Best Cyber Threat Intelligence Tools In 2023

As the year draws to a close, it’s crucial for businesses to reflect on their cybersecurity posture and consider the…

City of Philadelphia suffers a data breach
10
Dec
2023

Hacktivists hacked a Irish water utility and interrupted water supply

Hacktivists hacked an Irish water utility and interrupted the water supply Pierluigi Paganini December 09, 2023 Threat actors launched a…

5Ghoul flaws impact hundreds of 5G devices with Qualcomm, MediaTek chips
09
Dec
2023

5Ghoul flaws impact hundreds of 5G devices with Qualcomm, MediaTek chips

5Ghoul flaws impact hundreds of 5G devices with Qualcomm, MediaTek chips Pierluigi Paganini December 09, 2023 A set of flaws,…

Android
09
Dec
2023

AutoSpill attack steals credentials from Android password managers

Security researchers developed a new attack, which they named AutoSpill, to steal account credentials on Android during the autofill operation….

Snatch Ransomware Group Claims The FDVA Cyber Attack
09
Dec
2023

5 ICS Firewall Best Practices

Industrial control systems (ICS) that function well can help companies grow, meet emerging needs and maintain reliability. However, many people…