U.S. Sanctions 6 Iranian Officials for Critical Infrastructure Cyber Attacks

The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) announced sanctions against six officials associated with the Iranian intelligence agency for attacking critical...

Chrome Zero-Day Alert — Update Your Browser to Patch New Vulnerability

Google on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild.Tracked as...

‘eXotic Visit’ Spyware Campaign Targets Android Users in India and Pakistan

An active Android malware campaign dubbed eXotic Visit has been primarily targeting users in South Asia, particularly those in India and Pakistan, with malware...

Critical F5 Central Manager Vulnerabilities Allow Enable Full Device Takeover

Two security vulnerabilities have been discovered in F5 Next Central Manager that could be exploited by a threat actor to seize control of the...

New R Programming Vulnerability Exposes Projects to Supply Chain Attacks

A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to create a malicious RDS...

Malicious npm packages caught installing remote access trojans

The security group behind the "npm" archive for JavaScript libraries eliminated two npm bundles this Monday for containing malevolent code that introduced a far...

Agent Tesla upgarded version found capable of stealing Browser’s and VPN’s passwords

Senior security researchers from SentinelOne found that new variants of popular Agent Tesla are capable of Stealing credentials from various applications including popular web...

Cyber Risk Aware and Blue Cube Security tackles the increase in cyber threat, for...

Cyber Risk Aware announces a partnership with one of the UK’s largest cyber security solutions providers, Blue Cube Security. Cyber Risk Aware and Blue Cube...

Google Announces Passkeys Adopted by Over 400 Million Accounts

Google on Thursday announced that passkeys are being used by over 400 million Google accounts, authenticating users more than 1 billion times over the...

QEMU Emulator Exploited as Tunneling Tool to Breach Company Network

Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed "large company" to...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts