Google Fixed Actively Exploited Android Privilege Escalation Flaw (CVE-2024-32896)

Google has patched a high-severity vulnerability, known as CVE-2024-32896, in its Android OS actively exploited in the ...

Revival Hijack Attack Puts 22,000 PyPI Packages at Risk of Hijack

This method could potentially lead to numerous malicious package downloads. The attack involves hijacking popular ...

CISA Warns of Three Actively Exploited Vulnerabilities That Demand Immediate Attention

Two vulnerabilities, CVE-2021-20123 and CVE-2021-20124, pose serious risks for Draytek VigorConnect routers, potentially ...

RomCom Group’s Underground Ransomware Exploits Microsoft Zero-Day Flaw

A new ransomware variant named Underground, linked to the Russia-based RomCom group, encrypts files on victims’ Windows ...

U.S. Seizes 32 Pro-Russian Propaganda Domains in Major Disinformation Crackdown

The U.S. Department of Justice (DoJ) on Wednesday announced the seizure of 32 internet domains used by a pro-Russian ...

NIST Cybersecurity Framework (CSF) and CTEM – Better Together

It’s been a decade since the National Institute of Standards and Technology (NIST) introduced its Cybersecurity ...

FBI Warns Crypto Firms of Aggressive Social Engineering Attacks

The FBI issued a warning about aggressive social engineering attacks by North Korean hacking groups targeting ...

Threat Actors Using MacroPack to Deploy Brute Ratel, Havoc, and PhantomCore Payloads

Malicious actors potentially utilized the MacroPack red-teaming framework to distribute harmful payloads like Brute ...

1 32 33 34 35 36 37 38 39 40 41 42 667