As a result of a recent data breach, the NBA notified all its fans about the fact that a significant…
The relatively new Trigona ransomware strain, according to Unit 42 researchers, was particularly active in December 2022, targeting industries in…
As a result of a joint effort of the CISA, FBI, and MS-ISAC, a public advisory was published recently. This…
Researchers from the Korea University School of Cyber Security, Seoul, have recently presented a new covert channel attack known as…
As per the latest findings of ThreatFabric, a version of the Android banking trojan with the name Xenomorph has been…
When a DDoS attack is conducted, the server being targeted receives a large number of garbage requests. As a result,…
The breach of a Washington, DC, health insurance marketplace may have allowed hackers’ access to members of the House and…
There has been a proof-of-concept published recently for CVE-2023-21716 that analyzes this vulnerability. This vulnerability has been marked as "Critical"…
The cybersecurity analysts at ESET recently reported that BlackLotus, a sneaky bootkit for UEFI (Unified Extensible Firmware Interface), has gained…