A new Mac malware dubbed OSX/Linker leverages the recently disclosed macOS' Gatekeeper vulnerability to get executed on victim's machine without user permission or warnings.The...
Harbor is a cloud-native registry that offers rich functions in container management that stores signs and scan images for vulnerabilities. It can be integrated...
The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand.Blueshell backdoor...
Famous dating service app Tinder is required to share the user data including messages to Russian Law enforcement and intelligence agencies, according to Russia’s...
Cisco released fixes for Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition to address high-severity SQL injection vulnerability.“An attacker could exploit...
The signal is an encrypted communication app, using signal you can communicate with your easily and securely. It is the most scalable encryption tool...
In a significant escalation of cyber threats, the 8220 Gang, a notorious Chinese-based hacker group, has intensified its attacks on cloud-based infrastructure, targeting both Linux and Windows users to mine cryptocurrency.This latest campaign,...
Tamagotchi hacker, Natalie Silvanovich, who works as a Security Engineer on Prjoect Zero at Google recently received a bounty of $60,000 for identifying a...
A growing cyber threat involving Dropbox has emerged, and it's raising concerns across the cybersecurity landscape. In the initial two weeks of September, a staggering...