A new tool discovered on the Dark Web indicates a change in cybercriminal tactics for illicitly accessing...
Exploitation
PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers have unveiled...
A recent email spam campaign is distributing infostealer malware disguised as an Adobe Reader Installer. The spam...
The cybercriminal group BianLian, recognized for their ransomware assaults, has garnered attention from the information security community....
Vulnerability in Over 150,000 Fortinet Devices Enables Remote Execution of Arbitrary Code by Hackers
Vulnerability in Over 150,000 Fortinet Devices Enables Remote Execution of Arbitrary Code by Hackers
A critical security flaw, identified as CVE-2024-21762, has been uncovered in Fortinet’s FortiOS and FortiProxy secure web...