News

Why Digital Privacy is No Longer OptionalWith the way the world is today, being hyper-connected and living life online is just as essential to your safety as locking your digital front door. Whether ...
The Hunters International Ransomware-as-a-Service (RaaS) operation announced today that it has officially closed down its ...
According to the description for the security vulnerability, arbitrary code can be executed on a user's system if they visit ...
Two elevation of privilege vulnerabilities have been discovered on the popular Sudo utility, affecting 30-50 million ...
North Korean hackers are using Nim-compiled malware called “NimDoor” to target crypto companies on macOS, exploiting fake ...
SentinelLabs has issued a report about a new malware that targets Mac users of blockchain technologies. The report is quite ...
Embedded Linux-based Internet of Things (IoT) devices have become the target of a new botnet dubbed PumaBot . Written in Go, the botnet is designed to conduct brute-force attacks against SSH instances ...
Microsoft has made the tool open source, allowing work to be done on expanding its functionality and compatibility with Linux or other operating systems, for example. Microsoft outlines a timeline of ...
When testing VPN security, the first step is to see if it's using any protocols like PPTP that are outdated and crackable, or ...
A deceptive fake error attack vector, ClickFix, surged by over 500%, becoming the second most common attack method after phishing, and responsible for nearly 8% of all blocked attacks. SnakeStealer ...
The H1 2025 issue of the ESET Threat Report reviews the key trends and developments that shaped the threat landscape from ...