Hackers exploited a critical vulnerability and the built-in antivirus feature in Gladinet's Triofox file-sharing and ...
Cybercriminals are selling a plug-and-play remote access Trojan (RAT) named "Atroposia," further lowering the bar for new threat actors to target enterprises. Data security vendor Varonis today ...
Cybersecurity researchers have disclosed details of a new Android remote access trojan (RAT) called Fantasy Hub that's sold ...
Researchers uncover SleepyDuck RAT hidden in VSX extension, using Ethereum contracts to control infected hosts.
Law enforcement authorities from 9 countries have taken down 1,025 servers used by the Rhadamanthys infolstealer, VenomRAT, ...
Cybersecurity researchers at Google’s Mandiant Threat Defense have uncovered active exploitation of an unauthenticated access ...
An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
Weeks after being declared eradicated, GlassWorm is again infesting open source extensions using the same invisible Unicode ...
Cybersecurity firms CyberProof, Trend Micro, Sophos, and Kaspersky believe Maverick attacks WhatsApp web users by combining ...
This critical (CVSS 10.0) use-after-free (UAF) vulnerability in Lua scripting could allow authenticated attackers to execute ...
Your site got hacked overnight. And guess what? You didn’t even see it coming. According to Forbes, over 30,000 websites are hacked every single day. Most site owners are unaware of it until the ...