News
Instances of phishing attacks leveraging the Microsoft brand increased 266 percent in Q1 compared to the year prior. The bloom is back on phishing attacks with criminals doubling down on fake ...
The WordPress WP HTML Mail plugin for personalized emails is vulnerable to code injection and phishing due to XSS. More than 20,000 WordPress sites are vulnerable to malicious code injection ...
Lockbit is by far this summer’s most prolific ransomware group, trailed by two offshoots of the Conti group. After a recent dip, ransomware attacks are back on the rise. According to data ...
Tens of thousands of cameras have failed to patch a critical, 11-month-old CVE, leaving thousands of organizations exposed. New research indicates that over 80,000 Hikvision surveillance cameras ...
A radio control system for drones is vulnerable to remote takeover, thanks to a weakness in the mechanism that binds transmitter and receiver. The popular protocol for radio controlled (RC ...
Researchers uncover a watering hole attack likely carried out by APT TA423, which attempts to plant the ScanBox JavaScript-based reconnaissance tool. A China-based threat actor has ramped up ...
A targeted phishing attack takes aim at a major U.S. payments company. A sophisticated phishing campaign directed at a “major, publicly traded integrated payments solution company located in ...
The malware establishes initial access on targeted machines, then waits for additional code to execute. A brand-new multiplatform malware, likely distributed via malicious npm packages, is ...
The group blends into an environment before loading up trivial, thickly stacked, fraudulent financial transactions too tiny to be noticed but adding up to millions of dollars. Researchers have ...
The malicious extension, FriarFox, snoops in on both Firefox and Gmail-related data. A newly uncovered cyberattack is taking control of victims’ Gmail accounts, by using a customized, malicious ...
Stolen access token leveraged in phishing campaign that spoofs brand name email addresses. A surge in spearphishing emails designed to steal Office 365 credentials include some that were rigged to ...
We’ve had it beaten into our brains: Before you go wily-nily clicking on a page, check the URL. First things first, the tried-and-usually-but-not-always-true advice goes, check that the site’s ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results