Report: 99% of IoT Exploitation Attempts Rely on Previously Known CVEs

The expanding attack surface, with over 15 billion connected devices worldwide, raises concerns about privacy breaches ...

Pro-Bangladeshi Hacktivists Enter Global Stage with Matryoshka 424 Alliance

Team ARXU gained recognition earlier this year for targeting Romania over its support for Israel. The hacker group has a ...

Infostealing Malware Masquerading as Generative AI Tools

Information-stealing malware families have evolved to impersonate generative AI tools, with examples like GoldPickaxe ...

GootLoader is Still Active and Efficient

The malware has evolved into multiple versions, with GootLoader 3 being the latest one in use. Despite updates to the ...

Critical Unpatched Flaws Disclosed in Popular Gogs Open-Source Git Service

Four unpatched security flaws, including three critical ones, have been disclosed in the Gogs open-source, self-hosted ...

Apple Removes VPN Apps from Russian App Store Amid Government Pressure

Apple removed a number of virtual private network (VPN) apps in Russia from its App Store on July 4, 2024, following a ...

Latest Ghostscript Vulnerability Haunts Experts as the Next Big Breach Enabler

The vulnerability could be exploited to compromise systems without requiring user interaction, contrary to some severity ...

New Eldorado Ransomware Targets Windows, VMware ESXi VMs

Eldorado also encrypts network shares using the SMB protocol, deletes shadow volume copies, and skips certain file types ...

1 145 146 147 148 149 150 151 152 153 154 155 664