Cybersecurity is one of the most important topics on the global agenda, boosted by the pandemic. As the global digitalisation is further accelerating, the world is becoming ever more interconnected.…
Read more
Word and Excel documents are enlisted to disable Office macro warnings, so the Zloader banking malware can be downloaded onto systems without security tools flagging it.
The high-severity security vulnerabilities allow elevation of privileges, leading to data theft and more.
Notorious North Korean APT impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware.
A global effort to steal information from energy companies is using sophisticated social engineering to deliver Agent Tesla and other RATs.
The problem APIs included numero uno on the OWASP API Security Top 10: a Broken Object Level Authorization (BOLA) issue that could have exposed personal data.
Jason Kent, hacker-in-residence at Cequence Security, discusses fake online accounts, and the fraud they carry out on a daily basis.
Security vulnerabilities in the ERP platform could allow attackers to tamper with or sabotage victims’ business-critical processes and to intercept data.
Threat actors enlist compromised WordPress websites in campaign targeting macOS users.
The unnamed suspect allegedly helped to develop carding and phishing kits with the aim of stealing customers’ bank-card data.