Phishing kit screenshots your email domain on the fly to appear real
In a phishing campaign analysed by Security Report this week, threat actors are deploying JavaScript code within phishing webpages to...
In a phishing campaign analysed by Security Report this week, threat actors are deploying JavaScript code within phishing webpages to...
A new series of convincing phishing emails analyzed by Security Report are designed to impersonate Booking.com, but go a step...
Dominion National, Virginia-based insurance provider of dental and vision health benefits has reached settlement in the class action lawsuit concerning...
It turns out, the American multimedia software giant Adobe that is known for its creative products including Photoshop, Illustrator, Premiere...
One of the most used scripting languages of the 21st century is PHP. It is used on the client-side server...
A gray hat hacker has published over 7,000 dependency confusion packages to npm and PyPI repositories and continues to do...
This week a hacker put up records of 1.3 million Hyundai customers based in Russia for sale on a forum. The records expose...
This week, the Apache Flink project has disclosed two severe Path Traversal vulnerabilities in the framework that can allow attackers...
Cloudflare Web Application Firewall (WAF) which touts itself to protect some 25 million sites remains vulnerable to rule bypasses, researchers...
Multiple Zyxel devices including firewalls and access point (AP) controllers contain a hardcoded username-password combination in the firmware images, which...