A malicious PyPI package “aiocpa,” that stole crypto wallet data via obfuscated code, has been removed after being reported ...
A new cyber-attack technique uses Godot Engine to deploy undetectable malware via GodLoader, infecting more than 17,000 ...
The CSO of T-Mobile has clarified that no customer information was stolen by Chinese hacking group Salt Typhoon ...
Porsche Motorsport's IT Head, Friedemann Kurz, discusses the critical role of cybersecurity in Formula E and how network ...
This vulnerability was patched in May 2024 but was only allocated a CVE in November after evidence of exploitation ...
Customers of Advantech’s EKI-6333AC-2G industrial-grade wireless access point have been urged to update their devices to new ...
European police have arrested 21 individuals linked to a violent Albanian gang after decrypting their Sky ECC communications ...
A cyber-attack targeting Japanese and other East Asian organizations, suspected to be orchestrated by the threat group ...
Russia-backed hackers, known as RomCom, have exploited critical zero-day vulnerabilities in Mozilla Firefox and Windows to ...
Running from September 2 to October 31, Operation Serengeti involved authorities across 19 African nations. It targeted ...
One of the priorities of the newly-approved Von der Leyen Commission II will be to strengthen the healthcare sector’s cyber ...
A pro-Russian hacktivist collective, CyberVolk, has launched its own ransomware-as-a-service operations, SentinelLabs has ...