Everyday Mac users are now a common target for hackers and one of the key ways they attempt to infiltrate the systems is ...
Wordfence published an advisory on the WordPress Malcure Malware Scanner plugin, which was discovered to have a vulnerability rated at a severity level of 8.1. At the time of publishing, there is no ...
Discover how crypto malware operates through cryptojacking and ransomware, with real-world examples such as WannaMine and PowerGhost ...
Security researchers at Zimperium zLabs, a mobile security software provider, have uncovered a sophisticated evolution of the "GodFather" banking malware, which employs an advanced on-device ...
A new malware variant dubbed RESURGE has been uncovered by the US Cybersecurity and Infrastructure Security Agency (CISA) and is targeting Ivanti Connect Secure appliances through a critical ...
In recent years, the use of malware embedded in Adobe Acrobat PDF plugins has become an increasingly sophisticated threat to cybersecurity. As PDFs are a widely used format for document sharing, they ...
CISA has published a Malware Analysis Report (MAR) with analysis and associated detection signatures on files related to Microsoft SharePoint vulnerabilities, according to a press release yesterday.
Popular hardware monitoring apps are being flagged as malware Vulnerability in old driver triggers Microsoft Defender Users ...
The operators of the SystemBC proxy botnet are hunting for vulnerable commercial virtual private servers (VPS) and maintain an average of 1,500 bots every day that provide a highway for malicious ...
Don’t think Apple’s done enough, after two Java-related security patches, to address a much-reported Mac malware vulnerability? The company says it has new safeguarding measures in the offing. In a ...
Threat actors continue to exploit ToolShell to gain unauthorized access to on-premises SharePoint servers. On August 6, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) released a ...