A VPN service used by ransomware operators, fraudsters and data thieves to mask their activity has been taken offline in a ...
A nine-year-old logic flaw in the Linux kernel's process trace (ptrace) path has been discovered that could let unprivileged ...
A threat actor compromised an Nx developer and posed as a legitimate maintainer to publish a malicious extension on Visual ...
A popular developer of open source analytics software has revealed that a recent data breach and extortion incident was ...
Three-quarters of organizations have admitted to shipping vulnerable code, as AI risk proliferates in supply chains, ...
The Microsoft-owed software developer platform, GitHub, has confirmed a third-party has gained unauthorized access to 3800 ...
A 10-month Android malware campaign has used nearly 250 fake apps to sign victims up to premium services on their mobile ...
The Mini Shai-Hulud worm has resurfaced in one of its largest single-registry waves to date, hitting hundreds of npm packages ...
Security researchers have sounded the alarm over new scareware designed to lock users’ browsers and drive them to fraudulent ...
China-linked Webworm APT expands beyond Asia, targeting European government organizations and refining its cyber espionage ...
Vulnerability exploitation has overtaken compromised credentials for the first time in nearly two decades as the most common ...