Since February 2024, an unknown hacker group has been creating harmful Chrome browser extensions. These extensions look like useful tools as productivity apps, VPNs, or ...
By
The official website for RVTools, a tool used to report on VMware environments, was recently hacked. The installer available on the site was replaced with ...
By
A new malware is gaining traction among ransomware actors for post-exploitation activities. Threat actors are using a malware called Skitnet to siphon off sensitive data ...
By
Looking for a Luxury Bag? Dior Just Dropped One… Full of Customer Data! If you’ve recently been shopping for a luxury handbag, Dior might have ...
By
A recent proof-of-concept (PoC) shows how the Linux io_uring interface can be used to avoid system call-based detection methods. The io_uring asynchronous I/O performance feature ...
By
You get a call from an unknown number, thinking it’s just another unknown call. But that could be a phishing attempt. In the wake of ...
By
In its latest May release, Adobe released 13 security bulletins while addressing 40 CVEs in its products like Lighthouse, Dreamweaver, Connect, InDesign, Photoshop, Animate, Bridge, ...
By
Apple has issued a new round of updates aimed at fixing multiple vulnerabilities across iOS and macOS platforms, some of which impact features like Bluetooth, ...
By
To enhance user privacy and ensure meeting confidentiality, Microsoft Teams has announced an upcoming update to prevent screen capture during meetings. This feature aims to ...
By
Hackers are taking advantage of old, unsupported GeoVision smart devices called IOT devices to force them into a network of infected devices known as the ...
By