Critical Flaw in ‘Windows Hello’ Authentication: What It Means for Users
The consumer electronics giant disclosed its findings on a cyberattack in March, which involved data exfiltration impacting its Japanese operations.
The consumer electronics giant disclosed its findings on a cyberattack in March, which involved data exfiltration impacting its Japanese operations.
The consumer electronics giant disclosed its findings on a cyberattack in March, which involved data exfiltration impacting its Japanese operations.
Researchers from the University of California San Diego (UCSD) have discovered a novel method to launch Spectre-like side-channel attacks on high-end Intel CPUs, including the latest Raptor Lake and Alder Lake models.
A threat actor, or possibly multiple actors, has breached several plugins on the WordPress.org platform. These plugins have been compromised with code designed to grant attackers administrative privileges and facilitate additional malicious activities.
In a concerning turn of events, the UwU Lend protocol, which suffered a nearly $20 million hack on June 10, is now under siege again. Onchain data analytics platform Cyvers has reported the ongoing attack, indicating that the same perpetrators from the...
In the latest series of attacks by the rapidly expanding RansomHub ransomware, cybercriminals have taken advantage of the critical ZeroLogon vulnerability in the Windows Netlogon Remote Protocol (CVE-2020-1472), first identified in 2020, to gain initial access to victims' systems.
Check Point Software Technologies has alerted its customers that malicious actors are attempting to hack a limited number of old VPN local accounts.
A malicious crypto-mining campaign known as "REF4578" has been identified; it uses GhostEngine as its payload. This payload disables security measures and installs an XMRig miner by exploiting vulnerable drivers.
Attackers have increased their use of DNS tunneling to smuggle data from malware to command-and-control infrastructure, as well as to scan target networks and monitor online activity.
Home » News Approximately 50,000 instances of a widely used open-source proxy server, tailored for small networks, face susceptibility to denial-of-service (DoS) and potential remote code execution (RCE) due to an HTTP request-triggered flaw. The flaw, identified as CVE-2023-49606, resides in Tinyproxy versions...