Threat actors increasingly use Scalable Vector Graphics (SVG) attachments to display phishing forms or deploy malware while...
Mois : novembre 2024
Fake AI image and video generators infect Windows and macOS with the Lumma Stealer and AMOS information-stealing...
T-Mobile confirms it was hacked in the wave of recently reported telecom breaches conducted by Chinese threat...
GitHub projects have been targeted with malicious commits and pull requests, in an attempt to inject backdoors into these projects....
Israeli surveillance firm NSO Group reportedly used multiple zero-day exploits, including an unknown one named « Erised, » that...
A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them...
On Friday, the U.S. Federal Trade Commission (FTC) reported that the number of consumer complaints about unwanted...
A hacker responsible for stealing 119,754 Bitcoin in a 2016 hack on the Bitfinex cryptocurrency exchange was...
De multiples vulnérabilités ont été découvertes dans Xen. Elles permettent à un attaquant de provoquer un déni...
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d’entre elles permettent à un attaquant...