
New “ToolShell” Exploit Targets SharePoint Servers for Full Takeover
FortiGuard Labs has identified a critical new exploit chain dubbed “ToolShell” that is actively being…
LG Innotek Camera Flaws Could Give Hackers Full Admin Access
A critical security vulnerability has been discovered in LG Innotek’s LNV5110R CCTV camera model that…
Critical Salesforce Flaws Allow Remote Code Execution
Salesforce has disclosed a series of critical security vulnerabilities in its Tableau Server platform that…
Hackers Exploit Official Gaming Mouse Software to Spread Windows-based Xred Malware
Gaming peripheral manufacturer Endgame Gear has disclosed a security incident involving malware-infected software distributed through…
Microsoft Investigates Leak in Early Warning System Used by Chinese Hackers to Exploit SharePoint Vulnerabilities
Chinese laws requiring vulnerability disclosure to the government create transparency issues and potential conflicts for…
Arizona Woman Sentenced for Aiding North Korean IT Workers in Cyber Operations
Christina Marie Chapman, a 50-year-old Arizona woman, has been sentenced to 102 months in prison…
US Announces $15M Reward for North Korean IT Scheme Leaders
The United States government announced coordinated actions across multiple departments today, offering rewards totaling up…
Phishing Attack Spoofs Facebook Login Page to Capture Credentials
Cybercriminals are using a variety of dishonest tactics in a sophisticated phishing effort aimed at…
Fake Indian Banking Apps on Android Steal Login Credentials from Users
A malicious Android application has been uncovered, impersonating legitimate Indian banking apps to orchestrate credential…
Hackers Exploit Google Forms to Trick Victims into Stealing Cryptocurrency
Cybercriminals are increasingly using Google Forms to plan cryptocurrency theft in a sophisticated evolution of…