17-Year-Old Arrested in Connection with Cyber Attack Affecting Transport for London
British authorities on Thursday announced the arrest of a 17-year-old male in connection with a cyber attack affecting Transport for…
Hardware Supply Chain Threats Can Undermine Endpoint Infrastructure
To prevent this, organizations should focus on developing secure hardware and firmware foundations, enabling them to manage, monitor, and remediate…
Progress WhatsUp Gold Exploited Just Hours After PoC Release for Critical Flaw
Malicious actors are likely leveraging publicly available proof-of-concept (PoC) exploits for recently disclosed security flaws in Progress Software WhatsUp Gold…
TrickMo Android Trojan Exploits Accessibility Services for On-Device Banking Fraud
Cybersecurity researchers have uncovered a new variant of an Android banking trojan called TrickMo that comes packed with new capabilities…
Say Goodbye to Phishing: Must-Haves to Eliminate Credential Theft
Even as cyber threats become increasingly sophisticated, the number one attack vector for unauthorized access remains phished credentials (Verizon DBIR,…
The Dark Nexus Between Harm Groups and ‘The Com’
A cyberattack that shut down two of the top casinos in Las Vegas last year quickly became one of the…
New Linux Malware Campaign Exploits Oracle Weblogic to Mine Cryptocurrency
Cybersecurity researchers have uncovered a new malware campaign targeting Linux environments to conduct illicit cryptocurrency mining. The activity, which specifically…
Microsoft VS Code Undermined in Asian Spy Attack
A technique to abuse Microsoft’s built-in source code editor has finally made it into the wild, thanks to China’s Mustang…