A team of researchers at Georgia Tech, the University of Michigan, and Ruhr University Bochum have developed a novel attack…
attack
Researchers at Tencent Labs and Zhejiang University have presented a new attack called ‘BrutePrint,’ which brute-forces fingerprints on modern smartphones…
An APT hacking group known as “Dragon Breath,” “Golden Eye Dog,” or “APT-Q-27” is demonstrating a new trend of using…
Europol has dismantled a Franco-Israeli ‘CEO fraud’ group that employed business email compromise (BEC) attacks to divert payments from organizations…
Security researchers are seeing threat actors switching to a new and open-source command and control (C2) framework known as Havoc…
A new hacking campaign exploits Sunlogin flaws to deploy the Sliver post-exploitation toolkit and launch Windows Bring Your Own Vulnerable…
Hackers have leveraged a critical remote code execution vulnerability in Realtek Jungle SDK 134 million attacks trying to infect smart…
Researchers at the universities of California, Virginia, and Microsoft have devised a new poisoning attack that could trick AI-based coding…
Businesses that don’t pay extra attention to password-secured files and accounts often become victims of password attacks. In 2021, hackers used…
The vast majority of cyber-attacks over the past year have used TLS/SSL encryption to hide from security teams, according to…