Researchers at cybersecurity firm Perception Point have identified a new type of two-step phishing attack that exploits Microsoft Visio files…
Browsing: Threats and Vulnerabilities
Software supply chain company JFrog revealed on Monday that it had discovered 22 software vulnerabilities across 15 machine learning-related open-source…
In a major breakthrough, Google’s AI-powered research tool, Big Sleep, discovered a vulnerability in SQLite, one of the most widely…
Mobile security company Zimperium’s zLabs team has uncovered an advanced variant of the FakeCall malware that employs “Vishing” (voice phishing)…
Since August last year, Microsoft has identified a surge in intrusion activity with attackers using sophisticated password spray techniques to…
VIPRE Security Group’s Q3 2024 Email Threat Trends Report reveals the increasing sophistication of email-based threats, particularly business email compromise…
Three malicious packages uploaded to the npm registry were discovered to harbor BeaverTail, a JavaScript downloader and information stealer associated…
Cyware, a provider of threat intelligence management and cyber fusion solutions, has teamed up with ECS, a player in technology…
A recent cybersecurity report by SecurityScorecard and KPMG reveals that the US energy sector remains at high risk of cyber…
In a new and sophisticated campaign, the infamous North Korean-affiliated Lazarus APT group and its BlueNoroff subgroup have once again…