MoqHao Android Malware Evolves with Auto-Execution Capability

Threat hunters have identified a new variant of Android malware called MoqHao that automatically executes on infected devices…

Hands-on Review: Myrror Security Code-Aware and Attack-Aware SCA

The modern software supply chain represents an ever-evolving threat landscape, with each package added to the…

New Coyote Trojan Targets 61 Brazilian Banks with Nim-Powered Attack

Sixty-one banking institutions, all of them originating from Brazil, are the target of a new banking…

Canadian Man Sentenced to Prison for Ransomware Attacks

A Canadian involved in numerous ransomware and other types of cyberattacks against businesses, government entities, and…

Vulnerabilities in WatchGuard and Panda Security products could allow attackers to cause denial of service (DoS) conditions or execute arbitrary code with System privileges.

The bugs were identified in the Panda Kernel Memory Access driver (pskmad_64.sys) that is installed alongside…

PoC Exploit Published for Critical Jenkins Vulnerability

Updating to the latest Jenkins versions has become imperative, as proof-of-concept (PoC) exploit code targeting a…

Cyber Insecurity and Misinformation Top WEF Global Risk List

The latest World Economic Forum Global Risks Report 2024 highlighted the rising tide of cyber threats and places…

Only 4% of US States Fully Prepared for Cyber-Attacks Targeting Elections

Under 4% of US states are fully prepared to detect and recover from election-targeted cybersecurity incidents,…

New Terrapin Flaw Could Let Attackers Downgrade SSH Protocol Security

Security researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell (SSH) cryptographic…

CERT-UA Uncovers New Malware Wave Distributing OCEANMAP, MASEPIE, STEELHOOK

The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign orchestrated…