May 29, 2023Ravie LakshmananLinux / Network Security Linux routers in Japan are the target of a new Golang remote access trojan (RAT) called G...
Category: Attack
May 29, 2023Ravie LakshmananSupply Chain / Programming The Python Package Index (PyPI) announced last week that every account that maintains a...
A new phishing technique called "file archiver in the browser" can be leveraged to "emulate" a file archiver software in a web browser when a vi...
May 27, 2023Ravie LakshmananAPI Security / Vulnerability A critical security vulnerability has been disclosed in the Open Authorization (OAuth...
A new stealthy information stealer malware called Bandit Stealer has caught the attention of cybersecurity researchers for its ability to target...
May 25, 2023Ravie LakshmananSoftware Security / Supply Chain Google on Wednesday announced the 0.1 Beta version of GUAC (short for Graph for U...
May 25, 2023Ravie LakshmananEndpoint Security / Cyber Threat The threat actors behind the nascent Buhti ransomware have eschewed their custom ...
May 26, 2023Ravie LakshmananData Safety / Cloud Security A new security flaw has been disclosed in the Google Cloud Platform's (GCP) Cloud SQL...
5G is a game changer for mobile connectivity, including mobile connectivity to the cloud. The technology provides high speed and low latency whe...
Security researchers have shared a deep dive into the commercial Android spyware called Predator, which is marketed by the Israeli company Intel...
