Description Security researchers have identified a new hardware-level attack called GPUBreach, which exploits a Rowhammer-style vulnerability in GPU . . . Read more
Description Security researchers have identified a new information-stealing malware known as VoidStealer, which uses a novel technique to bypass brow . . . Read more
Description Security researchers have reported that the Interlock ransomware operation has been exploiting a critical vulnerability in Cisco Secure F . . . Read more
Description Security researchers have identified a large-scale software supply-chain attack involving the Glassworm malware campaign, which has compr . . . Read more
Description Dutch intelligence agencies have issued a cybersecurity warning regarding a large-scale campaign targeting user accounts on the messaging . . . Read more
Description Security researchers have identified a phishing campaign where attackers abuse the messaging features of Microsoft Teams to target employ . . . Read more
Description Security researchers have identified a new technique dubbed “Zombie ZIP” that allows attackers to hide malicious payloads inside speciall . . . Read more
Description Researchers from Microsoft have identified phishing campaigns that abuse legitimate OAuth error and redirection mechanisms to bypass emai . . . Read more
Description The Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting VMware Aria Operations to its Kn . . . Read more
Description The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning that a malware strain known as RESURGE can remain dorman . . . Read more
Description Researchers have reported a growing trend of cybercriminals bypassing identity verification (IDV) systems using advanced deepfake technol . . . Read more
Description Researchers have observed a coordinated campaign (tracked as TigerJack) that publishes malicious Visual Studio Code (VSCode) extensions to . . . Read more