It has been a bad six weeks for security firm Checkmarx. Over the past 40 days, it has been the victim of at least one supply ...
Making headlines everywhere is the CopyFail Linux kernel vulnerability, which allows local privilege escalation (LPE) from any user to root privileges on most kernels and distributions. Local ...
A threat group tracked as UNC6692 uses social engineering to deploy a new, custom malware suite named 'Snow' which includes a ...
Threat actors are abusing Hugging Face and ClawHub to distribute malware by injecting indirect prompts into malicious files.
If you use an Android phone, this deserves your attention. Cybersecurity researchers warn that hackers are using Hugging Face, a popular platform for sharing artificial intelligence (AI) tools, to ...
Over 70 clones of popular extensions published to the Open VSX marketplace in April are likely designed to deliver GlassWorm ...
Kim Komando reveals why AI-generated malware is beating free antivirus software, the dark web marketplace selling viruses for $100/month and the symptoms that mean your computer is already infected. ⚡ ...
Security researchers have identified malware dating back to 2005 that appears to have been designed to disrupt Iran’s nuclear ...
Security pros are warning about custom malware targeting Cisco firewalls, and surviving upgrades and reboots.
Plus: The FBI says a recent hack of its wiretap tools poses a national security risk, attackers stole Cisco source code as part of an ongoing supply chain hacking spree, and more.
Infostealer malware has been on the rise recently, and that's evident from the billions of user records leaked online in the past year alone. This type of malware targets everything from your name, ...
A newly identified malware strain designed to interact with operational technology (OT) systems has been analyzed by security ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results