Cybercriminals Renting WikiLoader to Target Italian Organizations with Banking Trojan
Organizations in Italy are the target of a new phishing campaign that leverages a new strain of malware called WikiLoader with an ultimate a...
Organizations in Italy are the target of a new phishing campaign that leverages a new strain of malware called WikiLoader with an ultimate a...
The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible Redis ...
More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home office (SOHO) r...
A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather sens...
Ivanti has disclosed yet another security flaw impacting Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core, that it said has...
The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC) module that's used for post-com...
An ongoing cyber attack campaign has set its sights on Korean-speaking individuals by employing U.S. Military-themed document lures to trick...
As part of Checkmarx's mission to help organizations develop and deploy secure software, the Security Research team started looking at t...
Users of Metabase, a popular business intelligence and data visualization software package, are being advised to update to the latest versio...
As cloud applications are built, tested and updated, they wind their way through an ever-complex series of different tools and teams. Across...
Misconfigured and poorly secured Apache Tomcat servers are being targeted as part of a new campaign designed to deliver the Mirai botnet mal...
The U.S. Securities and Exchange Commission (SEC) on Wednesday approved new rules that require publicly traded companies to publicize detail...
A deeper analysis of a recently discovered malware called Decoy Dog has revealed that it's a significant upgrade over the Pupy RAT, an o...
A new study conducted by Uptycs has uncovered a stark increase in the distribution of information stealing (a.k.a. infostealer or stealer) m...
A new malware family called Realst has become the latest to target Apple macOS systems, with a third of the samples already designed to infe...
The financially motivated threat actors behind the Casbaneiro banking malware family have been observed making use of a User Account Control...
How do you overcome today's talent gap in cybersecurity? This is a crucial issue — particularly when you find executive leadership or th...
As the number of people using macOS keeps going up, so does the desire of hackers to take advantage of flaws in Apple's operating system...
A new security vulnerability has been discovered in AMD's Zen 2 architecture-based processors that could be exploited to extract sensiti...
Ivanti is warning users to update their Endpoint Manager Mobile (EPMM) mobile device management software (formerly MobileIron Core) to the l...
Zero-day vulnerabilities in Windows Installers for the Atera remote monitoring and management software could act as a springboard to launch ...
Details have emerged about a now-patched flaw in OpenSSH that could be potentially exploited to run arbitrary commands remotely on compromis...
Cybersecurity researchers said they have discovered what they say is the first open-source software supply chain attacks specifically target...
A new variant of AsyncRAT malware dubbed HotRat is being distributed via free, pirated versions of popular software and utilities such as vi...
A new malware strain known as BundleBot has been stealthily operating under the radar by taking advantage of .NET single-file deployment tec...
Several distributed denial-of-service (DDoS) botnets have been observed exploiting a critical flaw in Zyxel devices that came to light in Ap...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an advisory on Thursday warning that the newly disclosed critical se...
Multiple security flaws have been disclosed in Apache OpenMeetings, a web conferencing solution, that could be potentially exploited by mali...
Microsoft on Wednesday announced that it's expanding cloud logging capabilities to help organizations investigate cybersecurity incident...
The prolific China-linked nation-state actor known as APT41 has been linked to two previously undocumented strains of Android spyware called...
Cybersecurity researchers have uncovered a privilege escalation vulnerability in Google Cloud that could enable malicious actors tamper with...
Discover stories about threat actors’ latest tactics, techniques, and procedures from Cybersixgill’s threat experts each month. Each story b...
Microsoft Word documents exploiting known remote code execution flaws are being used as phishing lures to drop malware called LokiBot on com...
All-In-One Security (AIOS), a WordPress plugin installed on over one million sites, has issued a security update after a bug introduced in v...
A new malware strain has been found covertly targeting small office/home office (SOHO) routers for more than two years, infiltrating over 70...
Zimbra has warned of a critical zero-day security flaw in its email software that has come under active exploitation in the wild. "A se...
Government entities, military organizations, and civilian users in Ukraine and Poland have been targeted as part of a series of campaigns de...
In a sign that cybersecurity researchers continue to be under the radar of malicious actors, a proof-of-concept (PoC) has been discovered on...
An unnamed Federal Civilian Executive Branch (FCEB) agency in the U.S. detected anomalous email activity in mid-June 2023, leading to Micros...
SonicWall on Wednesday urged customers of Global Management System (GMS) firewall management and Analytics network reporting engine software...
Microsoft on Tuesday released updates to address a total of 130 new security flaws spanning its software, including six zero-day flaws that ...
Brick-and-mortar retailers and e-commerce sellers may be locked in a fierce battle for market share, but one area both can agree on is the n...
Researchers have issued a warning about an emerging and advanced form of voice phishing (vishing) known as "Letscall." This techni...
Progress Software has announced the discovery and patching of a critical SQL injection vulnerability in MOVEit Transfer, popular software us...
Mastodon, a popular decentralized social network, has released a security update to fix critical vulnerabilities that could expose millions ...
Cybersecurity agencies have warned about the emergence of new variants of the TrueBot malware. This enhanced threat is now targeting compani...
Gcore Radar is a quarterly report prepared by Gcore that provides insights into the current state of the DDoS protection market and cybersec...
In yet another sign of a lucrative crimeware-as-a-service (CaaS) ecosystem, cybersecurity researchers have discovered a new Windows-based in...