News

Two critical vulnerabilities in Sudo command-line tool allow privilege escalation for local attackers on Linux systems ...
Google has been ordered by a court in the U.S. state of California to pay $314 million over charges that it misused Android ...
Over 40 malicious Firefox extensions impersonating popular crypto wallets have been uncovered, putting digital assets at risk ...
It's worth noting that IconAds is a variant of a threat that's also tracked by other cybersecurity vendors under the names ...
North Korean cyber group targets Web3 businesses with Nim-based malware, exploiting AppleScript and Telegram for persistent ...
Chinese hackers exploited Ivanti CSA zero-days, targeting French government, media, and telecom sectors in September 2024.
U.S. sanctions Russian BPH provider Aeza Group for hosting ransomware attacks, dark web drugs, and cybercrime.
Day, Outlook Malware, Banking Trojans and more | Read more hacking news on The Hacker News cybersecurity news website and ...
Proofpoint tracks overlapping tactics of TA829 and UNK_GreenSec, deploying TransferLoader and RomCom RAT globally.
The U.S. Department of Justice (DoJ) on Monday announced sweeping actions targeting the North Korean information technology ...
Cybersecurity researchers have discovered a critical security vulnerability in artificial intelligence (AI) company Anthropic ...
A security flaw in IDEs like Visual Studio Code lets attackers bypass extension verification, running malicious code on ...