Cybersecurity specialists report the detection of various malicious campaigns based on the abuse of a component in Microsoft Build Engine (MSBuild) in order to execute a Cobalt Strike payload onRead More →

Specialists from an Iranian security firm report the discovery of a one-of-a-kind rootkit hidden within the firmware of HP Integrated Lights-Out (HP iLO) devices, abused in the wild to eraseRead More →

This week, the Apache Software Foundation issued a new set of patches to address remote code execution (RCE) flaws in Log4j, which could be exploited by threat actors to compromiseRead More →

Amazon announced an emergency update for its Alexa voice assistant after a ten-year-old girl asked the famous voice for a challenge to meet, to which Alexa responded by challenging theRead More →

Many may not know it, but in addition to having access to the apps available in the Google Play Store, users of Samsung devices can download and install the applicationsRead More →

A cybersecurity specialist reports the detection of a dozen vulnerabilities in myPRO, a product developed by industrial automation firm mySCADA. Among the reported flaws, the expert highlighted an error consideredRead More →

Cybersecurity experts predict that AvosLocker ransomware infections will increase considerably on these holidays. While this is a newly emerging ransomware variant, it has already been detected in multiple incidents, wreakingRead More →

Internet entrepreneur Justin Kan had recently launched his own non-fungible token (NFT) platform, joining a growing but controversial trend. Although Kan’s obvious goal was to make a profit, shortly afterRead More →

KELA cybersecurity researchers, dedicated to monitoring illegal activity on the dark web and on the conventional Internet, report the detection of a new black market platform that has recently appearedRead More →