APT actor aligned with Chinese state interests has been observed weaponizing the new zero-day flaw in Microsoft Office to achieve code execution on affected…
Threat actors using novel approach to steal the credit card details of e-commerce shoppers by exploiting google apps script business application platform.
A new report published by cybersecurity researchers has unveiled evidence of Iranian state-sponsored hackers targeting dozens of companies and organizations in…
An EU initiative has designed and developed a computing platform based on a new memory technology. It will help improve the input/output (I/O) performance of…
Cybersecurity researchers have spotted a new cyberattack, which is believed to be the very first but amateur attempt to weaponize the infamous BlueKeep RDP…
Last week, Russia-based security researcher Emil ‘Neex Lerner has discovered a remote code execution vulnerability in the PHP bug tracker – classified as the…
The interface designed for the usage of cell carriers is being exploited heavily by attackers. It allows the cell carriers to get in direct touch with the SIM…
In a new intelligence report on threats was released this week by Microsoft, which claims to have detected resumed activity, in the form of Internet of Things…