USB attacks exploit common devices to spread malware. Wazuh detects threats like Stuxnet and Raspberry Robin across OS ...
Silk Typhoon exploits zero-day vulnerabilities, stolen API keys, and cloud services to infiltrate IT supply chains and ...
Lotus Panda targets Asian government and media sectors with new Sagerunex backdoor variants using Dropbox, X, and Zimbra for ...
Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) ...
Why is Identity the new prime target? The 2024 Verizon Data Breach Report found that 80% of breaches involve compromised ...
Google has announced the rollout of artificial intelligence (AI)-powered scam detection features to secure Android device ...
Attackers are using typosquatted Go packages to deploy malware on Linux and macOS, targeting financial developers.
Broadcom patches three actively exploited VMware flaws, including a critical (CVSS 9.3) bug enabling code execution. Update ...
Dark Caracal APT deploys Poco RAT malware in Latin America, targeting enterprises via phishing lures. Attackers use .REV ...
Hackers used a compromised Indian electronics firm’s email to deliver a Golang backdoor in a UAE-targeted phishing campaign.
CISA adds five exploited vulnerabilities to its KEV catalog, including flaws in Cisco, Microsoft, and Progress software.
Google has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including ...