Malware & Threats

Was North Korea Behind the $308 Million Cryptocurrency Heist?
Malware & Threats Was North Korea Behind the $308 Million Cryptocurrency Heist?

In May 2024, the cryptocurrency world was rocked by a massive theft involving $308 million. The Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Police Agency (NPA) of Japan quickly linked the heist to North Korean hackers. This incident

Supply Chain Attack Compromises npm Packages, Deploys Monero Miner
Malware & Threats Supply Chain Attack Compromises npm Packages, Deploys Monero Miner

On December 20, 2024, a significant cybersecurity incident unfolded, targeting popular npm packages. Attackers exploited a hijacked npm token to inject malicious code into updates for @rspack/core, @rspack/cli, and the Vant package. The primary goal of this breach was to deploy the XMRig Monero

Critical Path Traversal Flaw Resolved in Adobe ColdFusion Updates
Malware & Threats Critical Path Traversal Flaw Resolved in Adobe ColdFusion Updates

The recent detection of a critical vulnerability in Adobe ColdFusion versions 2023 and 2021 has heightened concerns surrounding the security of web applications utilizing this software. Tracked as CVE-2024-53961, this flaw leverages a path traversal weakness, which permits unauthorized access to

Are iPhone Users Safe from the New 'Zero-Click' Spyware Threat?
Malware & Threats Are iPhone Users Safe from the New 'Zero-Click' Spyware Threat?

Apple recently issued a critical security warning to iPhone users about sophisticated spyware capable of compromising devices without any user interaction. This revelation has sent shockwaves through the tech community, raising concerns about the vulnerability of even the most secure smartphones.

How Do You Install and Use Vuls for Linux Vulnerability Scanning?
Malware & Threats How Do You Install and Use Vuls for Linux Vulnerability Scanning?

Vuls, a free and open-source vulnerability scanner for Linux, offers a robust solution for scanning networked machines efficiently and effectively. It's specialized for various operating systems, provides multiple scanning methods, and doesn't require the installation of agents on

Is Serbia Using Spyware to Silence Activists and Journalists?
Malware & Threats Is Serbia Using Spyware to Silence Activists and Journalists?

In a startling revelation that has shocked the global community, Amnesty International has uncovered substantial evidence that the Serbian government under President Aleksandar Vucic is using sophisticated surveillance and intimidation tactics to silence activists and journalists who dare to

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later