Microsoft has revoked several Microsoft hardware developer accounts after drivers signed through their profiles were used in cyberattacks, including ransomware…
Blog
Twitter confirmed today that the recent leak of millions of members’ profiles, including private phone numbers and email addresses, resulted…
A previously undocumented Python backdoor targeting VMware ESXi servers has been spotted, enabling hackers to execute commands remotely on a…
Security researchers have noticed a spike in devices infected with the TrueBot malware downloader created by a Russian-speaking hacking group…
A new attack method named COVID-bit uses electromagnetic waves to transmit data from air-gapped systems, which are isolated from the internet,…
MuddyWater hackers, a group associated with Iran’s Ministry of Intelligence and Security (MOIS), used compromised corporate email accounts to deliver…
Cisco has disclosed today a high-severity vulnerability affecting the latest generation of its IP phones and exposing them to remote…
The busy holiday season is a time for bargains, special offers and intensive online shopping activity. However, just as manufacturers…
A new Go-based malware named ‘Zerobot’ has been spotted in mid-November using exploits for almost two dozen vulnerabilities in a variety of devices…
Four men suspected of hacking into US networks to steal employee data for identity theft and the filing of fraudulent…