A zero-day Zoom vulnerability could allow third parties to snoop on videoconferencing calls, reactivate uninstalled apps and conduct other malicious activities.
An Astaroth attack leveraged only living-off-the-land techniques to run the backdoor directly in memory on Windows machines.
A kernel flaw dubbed TCP SACK Panic could allow remote attackers to compromise organizations running large fleets of production Linux computers, according to a series of security advisories.
In theory, dealing with BlueKeep should be no different from dealing with other vulnerabilities. Unfortunately, many organizations are lagging in their patch management efforts.
Threat actors could use a recently discovered Windows 10 zero-day flaw to take over a computer and bypass local privilege escalation.
The new BlackSquid malware is capable of abusing eight notorious exploits in its attempts to install the XMRig Monero miner.
I will never watch "The Little Mermaid" again without thinking about ransomware and cyberattacks.
Two years since the WannaCry attacks wreaked havoc around the world, researchers say hundreds of thousands of people are being targeted with the EternalBlue exploit on which it was based.
Researchers observed cybercriminals selling an updated version of the KPOT stealer on some underground hacking forums.
Researchers published two pieces of exploit code that can allow anyone to interact with an organization's SAP enterprise resource planning platform and perform unauthorized transactions.