Threat analysts have discovered a recent malware distribution campaign using PDF attachments to smuggle malicious Word documents...
Mois : mai 2022
On the third and last day of the 2022 Pwn2Own Vancouver hacking contest, security researchers successfully hacked Microsoft’s Windows...
Yet another malicious Python package has been spotted in the PyPI registry performing supply chain attacks to...
The Chicago Public Schools has suffered a massive data breach that exposed the data of almost 500,000...
ESET researchers spot an updated version of the malware loader used in the Industroyer2 and CaddyWiper attacks...
When you hear the term ‘cryptocurrency’, does ‘secure’ also spring to mind? Here are some implications of...
Ransomware attacks continue to slow down, likely due to the invasion of Ukraine, instability in the region, and...
Cisco has addressed a zero-day vulnerability in its IOS XR router software that allowed unauthenticated attackers to remotely...
Organizations that deploy updates only after a vulnerability is disclosed apply far fewer updates and do so...
In a new phishing tactic, faux chatbots establish a conversation with victims to guide them to malicious...