Vulnerabilities in the image transfer protocol used in digital cameras enabled a security researcher to infect with ransomware a Canon EOS 80D DSLR over a [...]
Researchers analyzing the security of legitimate device drivers found that more than 40 from at least 20 hardware vendors can be abused to achieve [...]
As we creep towards the end of the summer, things have started to thankfully slow down a bit.While there are still plenty of ransomware attacks going [...]
An ongoing phishing campaign targeting several organizations with the help of DocuSign branded spam e-mails has been observed by Proofpoint's Threat [...]
Researchers found a clicker Trojan bundled with over 33 apps distributed through the Google Play Store and downloaded by Android users over 100 million times.
Apple decided to open its bug-bounty program and allow participation from all security researchers. While the resolution is not effective immediately, the [...]
Microsoft is currently working on improving the suspicious content submission experience for admins in all Microsoft 365 environments, as well as on [...]
The popular Steam game client for Windows has a zero-day privilege escalation vulnerability that can allow an attacker with limited permissions to run [...]
The threat of ransomware is more prevalent in the U.S., with more than half of the global detections originating from this country, a new report informs.
A new Spambot Trojan targeting French people has been discovered that records a victim's screen when they are using sites related to sex, pornography, [...]
The web site for the National Baseball Hall of Fame in Cooperstown, NY was hacked to include a malicious MageCart script that stole the payment information [...]
A vulnerability in Microsoft's Remote Desktop Protocol (RDP) can also be used to escape virtual machines running on Hyper-V, the virtualization technology [...]
Several vulnerabilities in apps available for LeapFrog's LeapPad tablets for children could be used to locate kids, interact with them, or phish parents [...]
Millions of mobile phones were illegally unlocked by AT&T insiders who took bribes of hundreds of thousands of US dollars to also plant unauthorized [...]
Today AT&T is announcing their launch of a new public bug bounty programs on the HackerOne platform. This program will allow security researchers [...]
The goal of any phishing scam is to make you do something you shouldn't do. Such is the case with a phishing campaign that utilizes PDF attachments that [...]
A new kit for web-based attacks calling itself Lord EK has been spotted at the beginning of the month as part of a malvertising chain that uses the PopCash [...]
CafePress, a well-known custom T-Shirt and merchandise site, suffered a data breach that exposed the personal information of 23 million of their customers.
Two serious vulnerabilities in Qualcomm's Snapdragon system-on-a-chip (SoC) WLAN firmware could be leveraged to compromise the modem and the Android kernel [...]
UK-based digital mobile-only bank Monzo asked roughly 480,000 of its customers to change their debit card PINs (personal identification numbers) after [...]
A Russian-backed hacking group was observed by Microsoft security researchers while compromising popular IoT devices to gain a foothold within several [...]
Microsoft launched today the Azure Security Lab, a sandbox-like environment designed to enable security professionals to test Azure security without [...]
An active sextortion campaign actively targeting a large database of more than 200 million compromised email accounts has been spotted by researchers at [...]
Multiple German companies were off to a rough start last week when a phishing campaign pushing a data-wiping malware targeted them and asked for a [...]
A long-running scam email campaign that pretends to be an unsubscribe confirmation request has seen an uptick recently. These emails should never be [...]
Since 2018, a constant stream of extortion email scams have been targeting users with fake threats designed to scare you into sending a payment in bitcoins [...]
Misconfigured Jira servers from big names in the tech industry exposed information about internal projects and users that could be accessed by anyone with [...]
This week the biggest news was attackers breaking into Iomega NAS devices, wiping the drives, and then leaving ransom notes. It is not known if any users [...]
NVIDIA released a GPU display driver security update to fix five high and medium severity vulnerabilities that could lead to local code execution, [...]
Amil Hassan Raage was arrested for defrauding two U.S. Universities of more than $870,000 as part of a business email compromise (BEC) fraud scheme he ran [...]
A spear-phishing campaign observed during late July targeted three U.S. entities from the utility sector with a new malware featuring a remote access [...]
For the second time in a week, Houston County Schools in Alabama had to delay their school year's opening due to a malware attack and the ongoing [...]
The number of stolen payment card details collected from South Korea has soared over the past two months more than one million records have been offered [...]
The StockX sneaker and streetwear resale site has started sending out emails to all of their users stating that they need to reset their passwords due to a [...]
A new malware strain is being distributed by threat actors via exploit kits like Fallout and RIG to hide malicious network traffic with the help of SOCKS5 [...]
The Empire post-exploitation framework used by hackers of all hats alike has been discontinued this week, passing the torch to newer tools for offensive [...]
A new threat group discovered recently focuses on organizations in the oil and gas industry and attacking telecommunication providers most likely in an [...]
The Federal Trade Commission (FTC) says that Equifax data breach victims who already have credit monitoring and opted to get a $125 cash payment might not [...]
Google is planning to add a new security feature to the Chrome web browser designed to block potential attackers from launching side-channel attacks and [...]
A publicly accessible ElasticSearch database exposed a huge trove of information on the global internal network of automotive giant Honda, showcasing [...]