A critical authentication bypass vulnerability has been discovered impacting the WordPress plugin 'Really Simple Security' ...
Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while ...
Israeli surveillance firm NSO Group reportedly used multiple zero-day exploits, including an unknown one named "Erised," that ...
GitHub projects have been targeted with malicious commits and pull requests, in an attempt to inject backdoors into these ...
Microsoft has pulled the 2024 Exchange security updates released during this month's Patch Tuesday because of email delivery ...
On Friday, the U.S. Federal Trade Commission (FTC) reported that the number of consumer complaints about unwanted ...
CISA warned today that two more critical security vulnerabilities in Palo Alto Networks' Expedition migration tool are now ...
A hacker responsible for stealing 119,754 Bitcoin in a 2016 hack on the Bitfinex cryptocurrency exchange was sentenced to ...
Palo Alto Networks is warning that a critical zero-day vulnerability on Next-Generation Firewalls (NGFW) management ...
Fake AI image and video generators infect Windows and macOS with the Lumma Stealer and AMOS information-stealing malware, used to steal credentials and cryptocurrency wallets from infected devices.
T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat actors to gain access to private communications, call records, and law enforcement ...
A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for likely DDoS or cryptomining attacks.