The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and…
Microsoft has identified a new Iranian state-sponsored threat actor, Peach Sandstorm, deploying a custom multi-stage backdoor named Tickler. This backdoor…
The eight Android and iOS apps fail to adequately protect user data, which transmits sensitive information, such as device details,…
Microsoft announced that Face Check with Microsoft Entra Verified ID is now generally accessible. It is available standalone and as…
Researchers studied the infrastructure behind clickbait PDF attacks by analyzing a large dataset of real-world PDFs to identify clickbait ones…
Threat actors often target and exploit security flaws in web browsers, as exploiting flaws in web browsers enables them to…
A sophisticated mobile attack vector involves a deceptive iOS update that masquerades as the legitimate iOS 18, tricking users into…
Ransomware affiliates are forming alliances to recoup losses from unreliable partners. A prominent example involves ALPHV extorting $22 million from…
The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy.…
A serious flaw in OpenSSH servers, dubbed "regreSSHion," affects macOS systems and could allow a remote attacker to execute arbitrary…