Information Security (Page 58)

CrowdStrike researchers report the detection of a hacking group operating from China and that has managed to infiltrate an academic institution by exploiting one of the flaws found in theRead More →

Cybersecurity specialists report the detection of various malicious campaigns based on the abuse of a component in Microsoft Build Engine (MSBuild) in order to execute a Cobalt Strike payload onRead More →

This week, the Apache Software Foundation issued a new set of patches to address remote code execution (RCE) flaws in Log4j, which could be exploited by threat actors to compromiseRead More →

Many may not know it, but in addition to having access to the apps available in the Google Play Store, users of Samsung devices can download and install the applicationsRead More →

A cybersecurity specialist reports the detection of a dozen vulnerabilities in myPRO, a product developed by industrial automation firm mySCADA. Among the reported flaws, the expert highlighted an error consideredRead More →

Cybersecurity experts predict that AvosLocker ransomware infections will increase considerably on these holidays. While this is a newly emerging ransomware variant, it has already been detected in multiple incidents, wreakingRead More →

Internet entrepreneur Justin Kan had recently launched his own non-fungible token (NFT) platform, joining a growing but controversial trend. Although Kan’s obvious goal was to make a profit, shortly afterRead More →

KELA cybersecurity researchers, dedicated to monitoring illegal activity on the dark web and on the conventional Internet, report the detection of a new black market platform that has recently appearedRead More →

Cybersecurity specialists report the detection of a flaw that would allow threat actors to abuse a set of load optimization features in Google Chrome to evade the Site Isolation feature.Read More →