De multiples vulnérabilités ont été découvertes dans Typo3. Elles permettent à un attaquant de provoquer un déni...
Mois : mai 2024
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d’entre elles permettent à un attaquant...
Google has released emergency security updates for the Chrome browser to address a high-severity zero-day vulnerability tagged...
Apple has backported security patches released in March to older iPhones and iPads, fixing an iOS Kernel...
A new package mimicked the popular ‘requests’ library on the Python Package Index (PyPI) to target macOS devices...
A cybercriminal using the name « salfetka » claims to be selling the source code of INC Ransom, a...
The Federal Communications Commission (FCC) has named its first officially designated robocall threat actor ‘Royal Tiger,’ a...
Since April, millions of phishing emails have been sent through the Phorpiex botnet to conduct a large-scale...
Since April, a new large-scale LockBit Black ransomware campaign has sent millions of phishing emails via the...
Threat actors are using Domain Name System (DNS) tunneling to track when their targets open phishing emails and click on malicious...