Critical Flaw in ‘Windows Hello’ Authentication: What It Means for Users
The consumer electronics giant disclosed its findings on a cyberattack in March, which involved data exfiltration impacting its Japanese operations.
The consumer electronics giant disclosed its findings on a cyberattack in March, which involved data exfiltration impacting its Japanese operations.
The consumer electronics giant disclosed its findings on a cyberattack in March, which involved data exfiltration impacting its Japanese operations.
Researchers from the University of California San Diego (UCSD) have discovered a novel method to launch Spectre-like side-channel attacks on high-end Intel CPUs, including the latest Raptor Lake and Alder Lake models.
In today’s digital era, cyberattacks have become increasingly sophisticated and prevalent, posing significant risks to businesses of all sizes.
A threat actor, or possibly multiple actors, has breached several plugins on the WordPress.org platform. These plugins have been compromised with code designed to grant attackers administrative privileges and facilitate additional malicious activities.
In a concerning turn of events, the UwU Lend protocol, which suffered a nearly $20 million hack on June 10, is now under siege again. Onchain data analytics platform Cyvers has reported the ongoing attack, indicating that the same perpetrators from the...
In the latest series of attacks by the rapidly expanding RansomHub ransomware, cybercriminals have taken advantage of the critical ZeroLogon vulnerability in the Windows Netlogon Remote Protocol (CVE-2020-1472), first identified in 2020, to gain initial access to victims' systems.
Check Point Software Technologies has alerted its customers that malicious actors are attempting to hack a limited number of old VPN local accounts.
A malicious crypto-mining campaign known as "REF4578" has been identified; it uses GhostEngine as its payload. This payload disables security measures and installs an XMRig miner by exploiting vulnerable drivers.
Attackers have increased their use of DNS tunneling to smuggle data from malware to command-and-control infrastructure, as well as to scan target networks and monitor online activity.