WebView2 Exploited: CoinLurker Malware Targets Cryptocurrency Wallets
Attackers are targeting cryptocurrency using fake software update notifications to deploy a sophisticated stealer malware known as CoinLurker. Written in […]
Attackers are targeting cryptocurrency using fake software update notifications to deploy a sophisticated stealer malware known as CoinLurker. Written in […]
A vulnerability in Apple’s iOS and macOS has highlighted a serious flaw that allowed attackers to bypass the Transparency, Consent,
A new malware technique leverages Windows’ UI Automation (UIA) framework, enabling stealthy malicious operations while bypassing endpoint detection and response
Cybersecurity experts are sounding the alarm after discovering widespread exploitation of a critical vulnerability in Cleo-managed file transfer software, affecting
Recent discoveries have shed light on critical prompt injection vulnerabilities in AI-powered tools like DeepSeek and Anthropic’s Claude AI. If
A newly discovered Windows zero-day vulnerability has surfaced, enabling attackers to steal NTLM credentials with minimal user interaction. The flaw,
A critical vulnerability in Mitel’s MiCollab software, now patched, has been revealed to enable attackers to gain unauthorized access to
Cloudflare’s developer platforms, including pages.dev and workers.dev, are increasingly exploited by cybercriminals for phishing and other malicious activities. These domains,
A new form of UEFI malware, named BootKitty, has been discovered targeting Linux systems by exploiting a serious vulnerability known
Over 20 security vulnerabilities are discovered in Advantech EKI industrial Wi-Fi access points, with several posing critical risks. These flaws
Two critical vulnerabilities in the widely used WordPress plugin, Spam protection, Anti-Spam, and FireWall by CleanTalk, have been discovered, potentially
In a sophisticated wave of cyberattacks, a Russia linked threat group RomCom has exploited two zero-day vulnerabilities—one in Mozilla Firefox
In a concerning development, cybercriminals are leveraging an old, vulnerable version of Avast’s Anti-Rootkit driver to disable security defenses and
New research highlights a major cybersecurity concern: over 145,000 Industrial Control Systems (ICS) are currently exposed to the internet across
Apple has rolled out critical security updates for its ecosystem, covering iOS, iPadOS, macOS, visionOS, and the Safari browser. These