Cyber criminals are copying legitimate smartphone applications and injecting them with malicious code to spy on users and steal personal…
A previously unknown Android malware uses the same shared-hosting infrastructure previously seen used by the Russian APT group known as…
A new remote access trojan (RAT) named Borat has appeared on darknet markets, offering easy-to-use features to conduct DDoS attacks,…
Apple has released security updates on Thursday to address two zero-day vulnerabilities exploited by attackers to hack iPhones, iPads, and…
A shocking 70% of EMEA organizations have no insider risk strategy despite employees directly or indirectly causing most data security…
A new zero-day vulnerability in the Spring Core Java framework called ‘Spring4Shell’ has been publicly disclosed, allowing unauthenticated remote code…
The United States Federal Bureau of Investigation (FBI) is currently investigating more than 100 different variants of ransomware, many of…
A new strain of Python ransomware is targeting environments using Jupyter Notebook. Jupyter Notebook is an open source web environment for…
A newly launched information-stealing malware variant called Mars Stealer is rising in popularity, and threat analysts are now spotting the…