The Android banking trojan Vultur has returned with new capabilities and enhanced methods to evade analysis and detection, allowing hackers to remotely access a...
A previously inactive botnet has resurfaced to use end-of-life small home/small office (SOHO) routers and IoT devices to power a malicious proxy service called...
Red Hat on Friday released an "urgent security alert" warning that two versions of a popular data compression library called XZ Utils (previously LZMA...
Malicious ads and fake websites are being used to distribute two different stealer malware, including Atomic Stealer, to target Apple macOS users.
According to a...
Security vulnerabilities found in Saflok electronic RFID locks by Dormakaba can be exploited by hackers to create forged keycards and gain unauthorized access to...
The Python Package Index (PyPI) repository temporarily suspended new user sign-ups due to an influx of malicious projects uploaded as part of a typosquatting...
A Linux version of a multi-platform backdoor called DinodasRAT has been detected in the wild targeting China, Taiwan, Turkey, and Uzbekistan, new findings from...