Docker recently found a serious flaw in some versions of Docker Engine and raised a warning that attackers can bypass authorized plugins (AuthZ) under specific ...
By
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems intending to steal users’ Google Cloud ...
By
A company named Acronis warned that a now-patched critical security flaw impacting its ACI product has been exploited wildly. This vulnerability is tracked as CVE-2023-45249, ...
By
Recently, a cybercrime operation has been exposed, and the threat actor dubbed “Stargazer Goblin”. In this scheme, the popular platform GitHub distributes malware through a ...
By
One of the widely used Android emulators for Windows, BlueStacks, was discovered with a major security flaw that could put millions of gamers at risk. ...
By
Cybersecurity experts have discovered a privilege escalation flaw in Google Cloud Platform’s Cloud Functions service. The vulnerability, which Tenable called ConfusedFunction, allows an attacker to ...
By
A Latin American financially motivated threat group, dubbed FLUXROOT, has been observed exploiting Google Cloud’s serverless infrastructure to conduct credential phishing campaigns. This highlights how ...
By
Google cookie reversal: a barrier to privacy? Google has decided not to drop support for third-party cookies, which the advertising industry uses to track and ...
By
SocGholish, also known as FakeUpdates, is a JavaScript-based downloader malware. It’s currently being employed to distribute two distinct payloads: a remote access trojan called AsyncRAT ...
By
A Beijing-linked state-sponsored hacking group known as Daggerfly has reportedly targeted entities in Taiwan and a U.S. NGO operating in China. The group employed an ...
By