Hackers began exploiting an authentication bypass vulnerability in SmarterTools' SmarterMail email server and collaboration ...
Threat actors are exploiting misconfigured web applications used for security training and internal penetration testing, such ...
During a House Oversight Committee hearing earlier this week on the Minnesota fraud case, Congresswoman Jasmine Crockett (D-CA) turns the tables on her colleagues by listing out the many examples of ...
You're currently following this author! Want to unfollow? Unsubscribe via the link in your email. Follow Tess Martinelli Every time Tess publishes a story, you’ll get an alert straight to your inbox!
Cybersecurity researchers have disclosed details of a new campaign dubbed SHADOW#REACTOR that employs an evasive multi-stage attack chain to deliver a commercially available remote administration tool ...
Cybersecurity researchers have disclosed details of a malicious Google Chrome extension that's capable of stealing API keys associated with MEXC, a centralized cryptocurrency exchange (CEX) available ...