SquareX discloses a new attack technique that shows how malicious extensions can be used to completely hijack the browser, ...
Quishing attacks (QR code phishing) are a new form of security threats that use QR codes as payloads. We have covered everything about these threats.
A high-severity vulnerability in the 7-Zip file archiver allows attackers to bypass the Mark of the Web (MotW) Windows ...
A MikroTik botnet exploited weak SPF configurations, spoofing 20,000 domains to launch widespread malspam campaigns.
A security researcher has discovered a code injection vulnerability in the thumbnail handler component of GNOME Files file manager that could allow hackers to execute malicious code on targeted Linux ...
Hackers possibly from the Russian Main Intelligence Directorate have been spying on neighboring government of Kazakhstan using legitimate documents that have been ...
Specifically, the documents are laced with a malicious macro that, when run by the victims, is engineered to create a second blank document in the "C:\Users\[USER]\AppData\Local\Temp\" location. "This ...
A shocked man on a sofa, realizing his phone may be compromised by a malicious app. Imagine downloading an app, excited for what it promises, only to find out later it is secretly mining your data ...
Lawsuit alleges 'malicious' prosecution for 2021 movie set shooting Judge dismissed Baldwin's case over withholding of evidence Prosecutors, officials, and evidence workers named in lawsuit Jan 9 ...
A new Nuclei vulnerability tracked as CVE-2024-43405 was discovered by researchers at Wiz that bypasses Nuclei's signature verification even if a template is modified to include malicious code.