Category: Attack

Critical Security Flaw Found in Popular LayerSlider WordPress Plugin

[ad_1] A critical security flaw impacting the LayerSlider plugin for WordPress could be abused to…

Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution

[ad_1] The malicious code inserted into the open-source library XZ Utils, a widely used package…

China-linked Hackers Deploy New 'UNAPIMON' Malware for Stealthy Operations

[ad_1] A threat activity cluster tracked as Earth Freybug has been observed using a new malware called…

Harnessing the Power of CTEM for Cloud Security

[ad_1] Cloud solutions are more mainstream – and therefore more exposed – than ever before.…

Google to Delete Billions of Browsing Records in 'Incognito Mode' Privacy Lawsuit Settlement

[ad_1] Google has agreed to purge billions of data records reflecting users' browsing activities to…

Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors

[ad_1] The threat actor known as TA558 has been attributed to a new massive phishing campaign that…

Indian Government Rescues 250 Citizens Forced into Cybercrime in Cambodia

[ad_1] The Indian government said it has rescued and repatriated about 250 citizens in Cambodia…

Detecting Windows-based Malware Through Better Visibility

[ad_1] Despite a plethora of available security solutions, more and more organizations fall victim to…

Malicious Apps Caught Secretly Turning Android Phones into Proxies for Cybercriminals

[ad_1] Several malicious Android apps that turn mobile devices running the operating system into residential…

Vultur Android Banking Trojan Returns with Upgraded Remote Control Capabilities

[ad_1] The Android banking trojan known as Vultur has resurfaced with a suite of new…