The BlackByte ransomware is back with version 2.0 of their operation, including a new data leak site utilizing...
Mois : août 2022
The high-severity security vulnerability (CVE-2022-2856) is due to improper user-input validation.
The stealthy crypter, active since 2015, has been used to deliver a wide range of information stealers...
A dozen malicious PyPi packages have been discovered installing malware that modifies the Discord client to become...
Microsoft PowerToys is getting a new utility called PowerOCR that lets you select text in an image...
Microsoft PowerToys is getting a new utility called PowerOCR that lets you select text in an image...
The state-sponsored group particularly targets organizations working on behalf of the Uyghurs, Tibet, and Taiwan, looking to...
A suspected Iranian threat actor known as UNC3890 is gathering intel that could be used for kinetic...
The increased sophistication of cyberattacks makes them more widely damaging and difficult to prevent.
A dozen malicious PyPi packages have been discovered installing malware that modifies the Discord client to become...