This week, Gemini Crypto Exchange said that phishing attacks were launched against customers after a threat actor obtained personal information from a third-party vendor. The Gemini...
README.md [Website] [Blog] [Shop] [Documentation] [Demo] [Find Out More] Attack Surface Management Discover hidden assets and vulnerabilities in your environment [Find out more] The ultimate...
Using an undocumented credentials stealer dubbed “MirrorStealer,” a hacking group known as MirrorFace has been targeting Japanese politicians for weeks in advance of the House of...
Apple has fixed the tenth zero-day vulnerability since the beginning of the year in security updates that were released today. This latest one was actively used...
K🔑Logger v3.0.0 Description Remote persistent 🔑Logger for Windows and Linux Features Logs keys pressed on keyboard upload reports in anonfile. Works with Linux and Windows. Does not require...
Microsoft’s December 2022 Patch Tuesday comes with fixes for 49 vulnerabilities, including two zero-day vulnerabilities and one that has been actively exploited. Because they permit remote...
A security flaw exposed Honda, Nissan, Infiniti, and Acura automobiles to remote attacks via SiriusXM’s connected vehicle service has been discovered by cybersecurity researchers. The issue...
A new zero-day flaw in Google’s Chrome web browser that has been actively exploited was fixed in an out-of-band security update on Friday. A type confusion...
An attack infrastructure that spoofs the Microsoft login page of Global Ordnance, a legitimate U.S.-based military weapons and hardware supplier, has been linked to a state-sponsored...
In an effort to broaden its target audience, researchers have identified a new hybrid malware campaign that targets both Windows and Android operating systems. A ThreatFabric...