Cisco has addressed severe vulnerabilities in the Cisco Nexus Dashboard data center management solution that can let remote attackers execute…
Blog
LinkedIn is holding the top spot for the most impersonated brand in phishing campaigns observed during the second quarter of…
A cryptomining gang known as 8220 Gang has been exploiting Linux and cloud app vulnerabilities to grow their botnet to…
Cybersecurity researchers have discovered three Android malware families infiltrating the Google Play Store, hiding their malicious payloads inside many seemingly…
The FBI has warned today that cybercriminals use fraudulent cryptocurrency investment applications to steal funds from US investors. So far,…
After hitting Germany, Taiwan, South Korea, Japan, the US, and the U.K. the Roaming Mantis operation moved to targeting Android and…
A threat actor is infecting industrial control systems (ICS) to create a botnet through password “cracking” software for programmable logic controllers…
Apple has a tight grip over which apps iPhone owners can use. iOS users can only download apps from the App…
The record-breaking distributed denial-of-service (DDoS) attack that Cloudflare mitigated last month originated from a new botnet called Mantis, which is currently described…
A newly discovered phishing kit targeting PayPal users is trying to steal a large set of personal information from victims…