-
Security
/ 2 weeks agoMeta Files Lawsuits Over Celebrity Scam Ads
Meta Platforms, Inc. filed lawsuits on Thursday against advertisers based in Brazil, China, and Vietnam, alleging they used deceptive advertising to...
-
Security
/ 2 weeks agoTrojanized Gaming Tools Spread Java RAT via Browsers, Chat
Cybercriminals are distributing a remote access trojan (RAT) by tricking users into downloading compromised gaming utilities through web browsers and popular...
-
Security
/ 2 weeks agoNorth Korean Hackers Target Air-Gapped Networks via Cloud and USB
A North Korean state-sponsored hacking group has been observed using a novel combination of cloud-based and physical media malware to infiltrate...
-
Security
/ 2 weeks agoWeekly Security Bulletin Highlights Emerging Cyber Threats
A new weekly security bulletin has detailed over fifteen significant cybersecurity threats and developments observed globally. The report, compiled from industry...
-
Security
/ 2 weeks agoNew Backdoor Targets US Education and Healthcare Sectors
A previously undocumented cyber threat campaign has been targeting organizations within the education and healthcare sectors in the United States since...
-
Security
/ 2 weeks agoBotnet Uses Polygon Blockchain to Evade Security Takedowns
cybersecurity researchers have disclosed a new botnet loader that uses a public blockchain to store its commands, creating a resilient infrastructure...
-
Security
/ 2 weeks agoCisco SD-WAN Zero-Day Exploited Since 2023 for Admin Access
A critical, unpatched vulnerability in widely used Cisco networking software has been actively exploited by attackers for over a year to...
-
Security
/ 2 weeks agoMalicious NuGet Package Impersonates Stripe Library to Steal Tokens
cybersecurity researchers have disclosed a new malicious software package found on the NuGet Gallery, a major repository for .NET developers. The...
-
Security
/ 2 weeks agoMicrosoft Warns of Fake Next.js Job Repos Spreading Malware
Microsoft has issued a warning to software developers about a coordinated campaign using fake job listings and counterfeit code repositories to...
-
Security
/ 2 weeks agoCybersecurity Experts Urge Immediate Preparation for Post-Quantum Encryption
cybersecurity professionals are issuing a clear directive to organizations and governments worldwide: begin preparing for the transition to post-quantum cryptography immediately....

