CYBERSECURITY

How to Browse the Web More Sustainably With a Green Browser

How to Browse the Web More Sustainably With a Green Browser

The goal of eco-friendly browsing is to minimize needless digital load while maintaining an effective, practical, and user-friendly browsing experience. Wave Browser is intended for users who

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

GhostPoster Malware Found in 17 Firefox Add-ons with 50,000+ Downloads

17 Mozilla Firefox browser add-ons' logo files have been used in a new campaign called GhostPoster. Koi Security, which found the campaign, claims that the extensions have been downloaded mor

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass

Fortinet FortiGate Under Active Attack Through SAML SSO Authentication Bypass

Threat actors have begun to exploit two newly disclosed security flaws in Fortinet FortiGate devices. Cybersecurity company Arctic Wolf said it observed active intrusions involving malicious

Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time

Fix SOC Blind Spots: See Threats to Your Industry & Country in Real Time

Security teams frequently have the impression that their headlights are failing and they are driving through fog. Alerts proliferate, threats intensify, and SOCs find it difficult to determin

FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks

FCC Bans Foreign-Made Drones and Key Parts Over U.S. National Security Risks

Uncrewed aircraft systems (UAS) and UAS critical components manufactured abroad have been added to the U.S. Federal Communications Commission's (FCC) Covered List. The action will prevent dro

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

Fake WhatsApp API Package on npm Steals Messages, Contacts, and Login Tokens

A recently released malicious package on the npm repository functions as a complete WhatsApp API. It has the capacity to link the attacker's device to the victim's WhatsApp account and interc

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

Cracked Software and YouTube Videos Spread CountLoader and GachiLoader Malware

Researchers reveal information about a recent campaign that made use of websites that distribute cracked software. The campaign makes use of a new iteration of the Count loader, a stealthy an

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Compromised IAM Credentials Power a Large AWS Crypto Mining Campaign

Customers of Amazon Web Services (AWS) have been the target of an ongoing campaign that uses compromised Identity and Access Management (IAM) credentials to facilitate cryptocurrency mining.

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

Cisco Warns of Active Attacks Exploiting Unpatched 0-Day in AsyncOS Email Security Appliances

A maximum-severity zero-day vulnerability in Cisco's AsyncOS software has been made known to users. A China-nexus advanced persistent threat (APT) actor known as UAT-9686 has been actively us

CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

A security vulnerability has been added to the Known Exploited Vulnerabilities (KEV) catalog by the U.S. Cybersecurity and Infrastructure Security Agency. The vulnerability, known as CVE-2023

China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware

China-Linked Ink Dragon Hacks Governments Using ShadowPad and FINALDRAFT Malware

Jewelbug, a threat actor, has been concentrating more on European government targets. The cluster is being monitored by Check Point Research under the moniker Ink Dragon. It is estimated that

China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

China-Linked Evasive Panda Ran DNS Poisoning Campaign to Deliver MgBot Malware

Kaspersky: An APT group connected to China tainted DNS queries in order to distribute the MgBot backdoor. The group primarily targeted particular victims with adversary-in-the-middle (AitM) a

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

Attacks are Evolving: 3 Ways to Protect Your Business in 2026

The likelihood of small and medium-sized businesses (SMBs) being targeted has increased. Large companies investing in cybersecurity and refusing to pay ransoms are the reasons behind this shi

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

APT28 Targets Ukrainian UKR-net Users in Long-Running Credential Phishing Campaign

APT28, a Russian state-sponsored threat actor, has been linked to a credential-harvesting campaign that targets UKR[. ]net users. The activity builds on earlier findings from the cybersecurit

Top 5 this week

Page 22 of 22