Cybersecurity Blog
Apple Patches AirPods Bluetooth Vulnerability That Could Allow Eavesdropping
Apple has released a firmware update for AirPods that could allow a malicious actor to gain access to the headphones in ...
Russian Hackers Target Ukraine with XWorm RAT Malware Payload
Cyble Research and Intelligence Labs (CRIL) researchers have discovered that a Russia-linked threat group known as ...
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
Multiple content management system (CMS) platforms like WordPress, Magento, and OpenCart have been targeted by a new ...
Authentication Bypasses in MOVEit Transfer and MOVEit Gateway
A critical security vulnerability, CVE-2024-5806, has been found in MOVEit Transfer, a popular file transfer software. ...
New Medusa Android Trojan Targets Banking Users Across 7 Countries
Cybersecurity researchers have discovered an updated version of an Android banking trojan called Medusa that has been ...
The Growing Threat of Malware Concealed Behind Cloud Services
Cybersecurity threats are utilizing cloud services, such as AWS and DriveHQ, to store, distribute, and control malicious ...
Over 110,000 Websites Affected by Hijacked Polyfill Supply Chain Attack
Google has taken steps to block ads for e-commerce sites that use the Polyfill.io service after a Chinese company ...
Report: Cloud Breaches Impact Nearly Half of Organizations
According to the Thales 2024 Cloud Security Study, 44% of organizations have experienced a cloud data breach, with 14% ...