A threat actor has claimed to have discovered a zero-day vulnerability in the widely-used Google Chrome browser....
Month: June 2024
A suspected China-nexus cyber espionage actor has been attributed as behind a prolonged attack against an unnamed...
This week, ESET experts released several research publications that shine the spotlight on a number of notable...
Traditional application security practices are not effective in the modern DevOps world. When security scans are run...
We spoke to Michel Mayor about the importance of public engagement with science and how to foster...
Legitimate-but-compromised websites are being used as a conduit to deliver a Windows backdoor dubbed BadSpace under the...
AĀ critical securityĀ vulnerability, CVE-2024-5806, has been identified in MOVEit Transfer, a widely used managed file transfer software. The...
IT threat evolution Q1 2024 IT threat evolution Q1 2024. Mobile statistics IT threat evolution Q1 2024....
Threat actors have been observed deploying a malware called NiceRAT to co-opt infected devices into a botnet....
A new method of distributing the Remcos Remote Access Trojan (RAT) has been identified. This malware, known...