Ivanti fixes maximum severity RCE bug in Endpoint Management software
Ivanti has fixed a maximum severity vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers gain remote…
Ivanti has fixed a maximum severity vulnerability in its Endpoint Management software (EPM) that can let unauthenticated attackers gain remote…
A privacy flaw in WhatsApp, an instant messenger with over 2 billion users worldwide, is being exploited by attackers to…
GitHub is being abused to distribute the Lumma Stealer information-stealing malware as fake fixes posted in project comments. [...]
GitHub is being abused to distribute the Lumma Stealer information-stealing malware as fake fixes posted in project comments. [...]
Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics.
North Korean hackers have exploited a recently patched Google Chrome zero-day (CVE-2024-7971) to deploy the FudModule rootkit after gaining SYSTEM…
The Russian state-sponsored APT29 hacking group has been observed using the same iOS and Android exploits created by commercial spyware…
Google has more than doubled payouts for Google Chrome security flaws reported through its Vulnerability Reward Program, with the maximum…
The release of new NIST quantum-proof cryptography standards signals it's time for cybersecurity teams to get serious about preparing for…
The Qilin ransomware group has been using a new tactic and deploys a custom stealer to steal account credentials stored in…