The RIG Exploit Kit is undergoing its most successful period, attempting roughly 2,000 intrusions daily and succeeding in about 30%…
Blog
Hackers are actively exploiting two critical-severity vulnerabilities in the Houzez theme and plugin for WordPress, two premium add-ons used primarily…
Threat actors have been observed uploading over 15,000 spam packages to the npm open-source JavaScript repository from multiple user accounts within hours….
Security researchers have observed a hacking group targeting companies in the materials research sector with a unique toolset that includes a…
An ongoing malware campaign targets YouTube and Facebook users, infecting their computers with a new information stealer that will hijack…
Threat actors are exploiting the popularity of OpenAI’s ChatGPT chatbot to distribute malware for Windows and Android, or direct unsuspecting…
Google has started working to harden the security of Android at the firmware level, a component of the software stack…
Security researchers have released a proof-of-concept exploit for a critical-severity vulnerability (CVE-2022-39952) in Fortinet ‘s FortiNAC network access control suite. Fortinet…
A new information stealer malware called Stealc has emerged on the dark web gaining traction due to aggressive promotion of stealing capabilities and…
A ransomware threat called HardBit has moved to version 2.0 and its operators are trying to negotiate a ransom payment that…