Ultralytics AI Library Compromised: Cryptocurrency Miner Found in PyPI Versions
In yet another software supply chain attack, it has come to light that two versions of a popular Python artificial…
Pegasus Spyware Infections Proliferate Across iOS, Android Devices
The notorious spyware from Israel’s NSO Group has been found targeting journalists, government officials, and corporate executives in multiple variants…
Veeam Urges Updates After Discovering Critical Vulnerability
The vulnerability affects certain versions of the Veeam Service Provider Console that can only be fixed by updating with the…
This $3,000 Android Trojan Targeting Banks and Cryptocurrency Exchanges
As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a newly discovered Android…
There’s a Weak Spot in Your System, and Threat Actors Are Going to Find It
In today’s hyper-connected world, no system is impervious to vulnerabilities. Threat actors, hackers, cybercriminals, and malicious insiders are constantly on…
CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat
Individuals concerned about the privacy of their communications should consider using encrypted messaging apps and encrypted voice communications, CISA and…
Hackers Leveraging Cloudflare Tunnels, DNS Fast-Flux to Hide GammaDrop Malware
The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to conceal its staging infrastructure…
Trojan-as-a-Service Hits Euro Banks, Crypto Exchanges
At least 17 affiliate groups have used the “DroidBot” Android banking Trojan against 77 financial services companies across Europe, with…