The 2024 Browser Security Report Uncovers How Every Web Session Could be a Security...

With the browser becoming the most prevalent workspace in the enterprise, it is also turning into a popular attack vector for cyber attackers. From...

Apple Releases Security Updates to Patch Critical iOS and macOS Security Flaws

Apple on Monday released security patches for iOS, iPadOS, macOS, tvOS, watchOS, and Safari web browser to address multiple security flaws, in addition to...

Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns

Cybersecurity researchers have observed a spike in email phishing campaigns starting early March 2024 that delivers Latrodectus, a nascent malware loader believed to be...

NSA warns of login abuse for local-to-cloud attacks

The US National Security Agency has published a security advisory on Thursday warning about two techniques hackers are using to escalate access from compromised...

New ‘VietCredCare’ Stealer Targeting Facebook Advertisers in Vietnam

Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed VietCredCare at least since August 2022.The malware is "notable for...

Warning: New Malware Emerges in Attacks Exploiting Ivanti VPN Vulnerabilities

Google-owned Mandiant said it identified new malware employed by a China-nexus espionage threat actor known as UNC5221 and other threat groups during post-exploitation activity...

Exposed Secrets are Everywhere. Here’s How to Tackle Them

Picture this: you stumble upon a concealed secret within your company's source code. Instantly, a wave of panic hits as you grasp the possible...

Researchers Uncover Flaws in Python Package for AI Models and PDF.js Used by Firefox

A critical security flaw has been disclosed in the llama_cpp_python Python package that could be exploited by threat actors to achieve arbitrary code execution.Tracked...

Flaw in Safari browser’s API lets local files be stolen

Being one of the major web browsers, Safari browser gets its fair share of scrutiny from cybersecurity professionals. In the latest, researcher Pawel Wylecial...

Phishers rely on remotely hosted images to bypass email filters

Loading remotely hosted images rather than embedding them directly into emails is one among the newest tricks employed by phishers to bypass email filters. Phishers...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts