Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two Chinese Advanced Persistent Threat (APT) groups…
A recent security alert warns of three critical vulnerabilities actively exploited in the wild, of which the first is CVE-2023-48788,…
Political parties are often targeted by hackers since they want to achieve various goals. This is because hackers may attempt…
Strelastealer malware has been found to be distributed in large-scale campaigns that have currently impacted over 100 organizations across the…
A new tool, GEOBOX, was advertised on the Dark Web that utilizes Raspberry Pi devices for fraud and anonymization, allowing…
Staying ahead of security measures and exploiting new vulnerabilities requires hackers to change their tactics. By doing so, they manage…
Attackers are taking advantage of vulnerabilities in JetBrains Teamcity to distribute ransomware, coinminers, and backdoor payloads. Two critical vulnerabilities in…
A group of cybersecurity researchers has uncovered several critical security flaws in the Saflok electronic RFID locks by Dormakaba. These…
As deep neural networks (DNNs) become more prevalent, concerns over their security against backdoor attacks that implant hidden malicious functionalities…
Cybersecurity experts have uncovered a sophisticated cyber espionage campaign orchestrated by the North Korean threat actor group Kimsuky, Black Banshee,…