The cybersecurity analysts at Check Point Research recently reported that TrickGate, a shellcode-based packer, has been in operation for over…
Prilex is indeed a single threat actor that transformed from malware targeted at ATMs into distinctive modular point-of-sale (PoS) malware. Prilex…
GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning…
The lack of rate-limiting in Instagram was discovered by Gtm Mänôz, a security researcher from Kathmandu, Nepal. This flaw could…
As a result of an international law enforcement operation, the sites utilized by the Hive ransomware operation for both payments…
Rapid7 is taking action in response to several instances of compromise caused by the exploitation of CVE-2022-47966, which is a…
CircleCI, a DevOps platform, discovered that malware installed on a CircleCI engineer's laptop was used by an unauthorized third party…
There have been reports that an organized threat actor, known as Blind Eagle (tracked as APT-C-36), has re-appeared again with…
SMB servers that have ksmbd enabled are vulnerable to hacking due to a major Linux kernel vulnerability (CVSS score of…
It has recently been discovered by researchers that Windows has a vulnerability that allows code execution that rivals EternalBlue in…