Rapid7 unearthed a malicious campaign targeting Windows 10 running on Chrome browsers. The objective of the campaign is to obtain… Read More
Researchers have disclosed details about a now-patched critical vulnerability in a time and billing system called BillQuick that was being… Read More
A remote attacker could abuse the flaw to execute arbitrary code on targeted systems, underscoring how vulnerabilities in such software… Read More
Tracked as CVE-2021-41556, the issue occurs when a game library referred to as Squirrel Engine is used to execute untrusted… Read More
If you connect databases / servers to the internet and secure them poorly, you can count on them getting compromised… Read More
Experts reported a phishing attempt targeted at Verizon that involves the use of mathematical symbols to bypass anti-phishing systems to… Read More
The operators behind the pernicious TrickBot malware have resurfaced with new tricks that aim to increase its foothold by expanding… Read More
Three of the security flaws fixed today by QNAP are high severity stored cross-site scripting (XSS) vulnerabilities tracked as CVE-2021-34354,… Read More
Fake installers of popular software are being used to deliver malware onto victims’ devices. These lures trick users into opening… Read More
As well as raising $20 million, a round co-led by Sequoia Capital and Accel, Stairwell launched its threat-hunting platform to… Read More
New macOS zero-day bug lets attackers run commands remotely A new vulnerability in Apple’s macOS Finder was revealed today, allowing… Read More
Threat actors impersonated the USDOT in a phishing campaign that used a combination of tactics – including creating new domains… Read More
BladeHawk attackers have been targeting the Kurdish ethnic group for more than a year through a Facebook-based spyware campaign that… Read More
A year-long mobile espionage campaign has been targeted against the Kurdish ethnic group to deploy two Android backdoors that masquerade… Read More
Autodesk, a California-based design software and 3D technology firm, has acknowledged that it was one of several tech and security… Read More
If exploited, an attacker could discover cameras that they do not own, instruct these cameras to broadcast their feeds to… Read More