Twitter Flaw Exposes Private Circle Tweets to Public
According to reports, there has been a security incident with Twitter’s Private Circle tweets feature as they have been exposed publicly.Twitter’s Private Circle was...
MSI Data Breach: Private Code Signing Keys Leaked on the Dark Web
May 08, 2023Ravie LakshmananData Breach / Software Security
The threat actors behind the ransomware attack on Taiwanese PC maker MSI last month have leaked...
Join Our Webinar: Learn How to Defeat Ransomware with Identity-Focused Protection
May 08, 2023The Hacker NewsWebinar / Ransomware
Are you concerned about ransomware attacks? You're not alone. In recent years, these attacks have become increasingly...
Cisco Phone Adapters Flaw Let Attackers Execute Arbitrary Code
Cisco SPA112 2-Port Phone Adapters have been reported to be vulnerable to arbitrary code execution via a malicious firmware upgrade. Cisco has classified this...
CERT-UA Warns of SmokeLoader and RoarBAT Malware Attacks Against Ukraine
May 08, 2023Ravie LakshmananCyber Attack / Data Safety
An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in...
Dragon Breath APT Group Using Double-Clean-App Technique to Target Gambling Industry
May 06, 2023Ravie LakshmananAdvanced Persistent Threat
An advanced persistent threat (APT) actor known as Dragon Breath has been observed adding new layers of complexity...
New Vulnerability in Popular WordPress Plugin Exposes Over 2 Million Sites to Cyberattacks
May 06, 2023Ravie Lakshmanan
Users of Advanced Custom Fields plugin for WordPress are being urged to update version 6.1.6 following the discovery of a...
Fleckpe Android Malware Sneaks onto Google Play Store with Over 620,000 Downloads
May 05, 2023Ravie LakshmananMobile Security / Android
A new Android subscription malware named Fleckpe has been unearthed on the Google Play Store, amassing more...
Lack of Visibility: The Challenge of Protecting Websites from Third-Party Scripts
May 05, 2023The Hacker NewsWebsite Security / Data Safety
Third-party apps such as Google Analytics, Meta Pixel, HotJar, and JQuery have become critical tools...
N. Korean Kimsuky Hackers Using New Recon Tool ReconShark in Latest Cyberattacks
May 05, 2023Ravie LakshmananCyber Threat / Malware
The North Korean state-sponsored threat actor known as Kimsuky has been discovered using a new reconnaissance tool...











